Prof. Eckstein has made arrangements with Texas Bar Books to provide his students free electronic access to “Essentials of Texas Water Resources 4th”. He will provide that access info to all registered students by early January. Students who inquire at the Book Store will be directed to Prof. Eckstein, although students should check their email as he will send it mid/late December.
\n
\n
\n
\n
\n
\n
\n
S/T TRANSFER PRICING 7900-
\n
\n
\n
\n
WILLIAM BYRNES
\n
\n
\n
S/T TRIAL ADVOCACY: CRIM 7900-635
\n
\n
\n
\n
VASSER
\n
\n\n\nSECURED TRANSACTIONS 7488\nWILLIAM HENNING\n\nUnderstanding Secured Transactions 5ed\nISBN: 9781579110321\nNew: 49.00 Used: 35.00\n\nSelect Commercial Law Statutes 2017\nISBN: 9781683287551\nNew: 62.00 Used: 45.00\n\nSECURITIES REGULATION 7492\nNEAL NEWMAN\n\nSecurities Regulation 8ed\nISBN: 9781609304133\nNew: 222.00 Used: 160.00\n\nSecurities Regulation Statutory Supplement 2017\nISBN: 9781683286370\nNew: 44.00\n\nSPANISH FOR LAWYERS 7487\nTBA\n\nTAX BUSINESS ENTITIES 7516\nGARY LUCAS\n\nFundamentals of Business Enterprise Taxation 6ed\nISBN: 9781634596039\nNew: 225.00 Used: 160.00\n\nLogic of Subchapter K: A Conceptual Guide to Taxation of Partnerships 5ed\nISBN: 9781634604727\nNew: 92.00 Used: 68.00\n\nSelected Federal Taxation Statutes, & Regulations 2018\nISBN: 9781683288077\nNew: 61.00 Used: 45.00\n\nTEXAS CRIM LAW PRACT 7725\nJACK STRICKLAND\n\nYou will need, or have access to:\nTexas penal Code\nTexas Code of Criminal Procedure\nTexas Rules of Evidence\nTexas Disciplinary Rules of Professional Conduct\n\nTEXAS CRIM PROCEDURE 7532\nCHARLES MALLIN\n\nTexas Criminal Procedure 12ed\nReamy, Bubany\n
<|endoftext|>Child Sexual Abuse in India and the Protection of Children from Sexual Offences (POCSO) Act 2012: A Research Review\n\nRenu*, Geeta Chopra**\n\n*Assistant Professor, Institute of Home Economics, University of Delhi. Delhi-110016, India\n**Associate Professor, Institute of Home Economics, University of Delhi, Delhi-110016, India\n\nReceived: Date of submission: 30th May, 2019 Accepted on: 2nd July, 2019 Published on: 29th July, 2019\n\nABSTRACT\n\nChild Sexual Abuse (CSA) is most heinous crime against children and in most instances, it is hidden in nature. It is the most under reported crime. The effect of CSA lingers across the lifetime of an individual. It is now being recognized as toxic stress which emotionally can harm the child irreparably. This paper presents studies on CSA in India. The Protection of Children from Sexual Offences (POCSO) act was enacted in 2012. POCSO has many difficulties in implementation. The paper also presents the researches done on POCSO putting across issues related to mandatory reporting, consensual sex, doctors preparedness for handling CSA victims, and status of special courts under POCSO.\n\nKeywords: CSA, POCSO, mandatory reporting, age of consent, special courts\n\n1. Introduction\n\nChild sexual abuse is widely prevalent, yet hardly reported. In the name of culture and tradition, at times, sexual violence against children is covered up, ignored or not reported. A protected child is a potential national resource whereas exploited child can become victim first and then an offender. Safety, security, harmony, loves and care is what a child needs to grow fully and to accomplish his/her full potential.\n\nTraditionally, in India, children were valued and pampered. But for some children truth was different they were sexually abused in the name of customs and folk practices. For example, in southern parts of India child prostitution was present in the name of ‘devadasi’. Devadasi is a girl child dedicated to worship and service of a deity. Today the truth and reality for CSA is reached to its worst level (Chopra, 2015). India is a highly diverse country. Indian culture is a combination of multiple religions, languages, different traditions, ethnicities", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " to gather and present relevant evidence on their own.\n\nThe investigation is a party’s opportunity to present testimonial and other evidence that the party believes is relevant to resolution of the allegations in the Formal Complaint. A party that is aware of and has a reasonable opportunity to present particular evidence and/or identify particular witnesses during the investigation, and elects not to, will be prohibited from introducing any such evidence during the adjudication absent a showing of mistake, inadvertence, surprise, or excusable neglect.\n\nC. Documentation of Investigation\n\nThe investigator will take reasonable steps to ensure the investigation is documented. Interviews of the parties and witnesses may be documented by the investigator’s notes, audio recorded, video recorded, or transcribed. The particular method utilized to record the interviews of parties and witnesses will be determined by the investigator in the investigator’s sole discretion, although whatever method is chosen shall be used consistently throughout a particular investigation.\n\nD. Access to the Evidence\n\nAt the conclusion of the evidence-gathering phase of the investigation, but prior to the completion of the investigation report, the Investigating Officer will transmit to each party and their advisor, in either electronic or hard copy form, all evidence obtained as part of the investigation that is directly related to the allegations raised in the Formal Complaint, including\nevidence the University may choose not to rely on at any hearing and inculpatory or exculpatory evidence whether obtained from a party or some other source. Thereafter, the parties will have ten (10) days in which to submit to the investigator a written response, which the investigator will consider prior to completing the investigation report.\n\nThe parties and their advisors are permitted to review the evidence solely for the purposes of this grievance process and may not duplicate or disseminate the evidence to the public.\n\nE. Investigation Report\n\nAfter the period for the parties to provide any written response as specified “Access to Evidence” has expired, the investigator will complete a written investigation report that fairly summarizes the various steps taken during the investigation, summarizes the relevant evidence collected, lists material facts on which the parties agree, and lists material facts on which the parties do not agree. When the investigation report is complete, the investigator will transmit a copy to the Title IX Coordinator. The investigator will also transmit the investigation report to each party and their advisor, in either electronic or hard copy form.\n\nXVI. ADJUDICATION PROCESS SELECTION\n\nAfter the investigator has sent the investigation report to the parties, the Title IX Coordinator will transmit to each party a notice advising the party of the two different adjudication processes specified in “Adjudication.” The notice will explain that the hearing process specified in “Hearing Process” is the default process for adjudicating all Formal Complaints and will be utilized unless both parties voluntarily consent to administrative adjudication as specified in “Administrative Adjudication (Optional)” as a form of informal resolution. The notice will be accompanied by a written consent to administrative adjudication and will advise each party that, if both parties execute the written consent to administrative adjudication, then the administrative adjudication process will be used in lieu of the hearing process. Parties are urged to carefully review this policy (including the entirety of “Adjudication”), consult with their advisor, and consult with other persons as they deem appropriate (including an attorney) prior to consenting to administrative adjudication.\n\nEach party will have three (3) days from transmittal of the notice specified in this Section to return the signed written consent form to the Title IX Coordinator. If either party does not timely return the signed written consent, that party will be deemed not to have consented to administrative adjudication and the Formal Complaint will be adjudicated pursuant to the hearing process.\n\nXVII. ADJUDICATION\n\nA. Hearing Process\n\nThe default process for adjudicating Formal Complaints is the hearing process specified in this Section (“Hearing Process”). The hearing process will be used to adjudicate all Formal Complaints unless both parties timely consent to administrative adjudication as specified in “Adjudication Process Selection.”\n1. Hearing Officer\n\nAfter selection of the hearing process as the form of administrative adjudication, the Title IX Coordinator will promptly appoint a hearing officer who will oversee the hearing process and render a determination of responsibility for the allegations in the Formal Complaint, at the conclusion of the hearing process. The Title IX Coordinator will see that the hearing officer is provided a copy of the investigation report and a copy of all evidence transmitted to the parties by the investigator as specified in \"Access to Evidence.\"\n\n2. Hearing Notice and Response to the Investigation Report\n\nAfter the hearing officer is appointed by the Title IX Coordinator, the hearing officer will promptly transmit written notice to the parties notifying the parties of the hearing officer’s appointment; setting a deadline for the parties to submit any written response to the investigation report; setting a date for the pre-hearing conference; setting a date and time for the hearing; and providing a copy of the University’s Hearing Procedures. Neither the pre-hearing conference, nor the hearing itself, may be held any earlier than ten (10) days from the date of transmittal of the written notice specified in this Section (\"Hearing Notice and Response to the Investigation Report\").\n\nA party’s written response to the investigation report must include:\n\n- To the extent the party disagrees with the investigation report, any argument or commentary regarding such disagreement;\n- Any argument that evidence should be categorically excluded from consideration at the hearing based on privilege, relevancy, the prohibition on the use of sexual history specified in “Sexual History,” or for any other reason;\n- A list of any witnesses that the party contends should be requested to attend the hearing pursuant to an attendance notice issued by the hearing officer;\n- A list of any witnesses that the party intends to bring to the hearing without an attendance notice issued by the hearing officer;\n- Any objection that the party has to the University’s Hearing Procedures;\n- Any request that the parties be separated physically during the pre-hearing conference and/or hearing;\n- Any other accommodations that the party seeks with respect to the pre-hearing conference and/or hearing;\n- The name and contact information of the advisor who will accompany the party at the pre-hearing conference and hearing;\n• If the party does not have an advisor who will accompany the party at the hearing, a request that the University provide an advisor for purposes of conducting questioning as specified in “Hearing.”\n\nA party’s written response to the investigation report may also include:\n\n• Argument regarding whether any of the allegations in the Formal Complaint are supported by a preponderance of the evidence; and\n\n• Argument regarding whether any of the allegations in the Formal Complaint constitute Sexual Harassment.\n\n3. Pre-Hearing Conference\n\nPrior to the hearing, the hearing officer will conduct a pre-hearing conference with the parties and their advisors. The pre-hearing conference will be conducted live, with simultaneous and contemporaneous participation by the parties and their advisors. By default, the pre-hearing conference will be conducted with the hearing officer, the parties, the advisors, and other necessary University personnel together in the same physical location. However, upon request of either party, the parties will be separated into different rooms with technology enabling the parties to participate simultaneously and contemporaneously by video and audio.\n\nIn the hearing officer’s discretion, the pre-hearing conference may be conducted virtually, by use of video and audio technology, where all participants participate simultaneously and contemporaneously by use of such technology.\n\nDuring the pre-hearing conference, the hearing officer will discuss the hearing procedures with the parties; address matters raised in the parties’ written responses to the investigation report, as the hearing officer deems appropriate; discuss whether any stipulations may be made to expedite the hearing; discuss the witnesses the parties have requested be served with notices of attendance and/or witnesses the parties plan to bring to the hearing without a notice of attendance; and resolve any other matters that the hearing officer determines, in the hearing officer’s discretion, should be resolved before the hearing.\n\n4. Issuance of Notices of Attendance\n\nAfter the pre-hearing conference, the hearing officer will transmit notices of attendance to any University employee (including administrator, faculty, or staff) or student whose attendance is requested at the hearing as a witness. The notice will advise the subject of the specified date and time of the hearing and advise the subject to contact the hearing officer immediately if there is a material and unavoidable conflict.\n\nThe subject of an attendance notice should notify any manager, faculty member, coach, or other supervisor, as necessary, if attendance at the hearing will conflict with job duties, classes, or other obligations. All such managers, faculty members, coaches, and other supervisors are required to excuse the subject of the obligation, or provide some other accommodation, so that the subject may attend the hearing as specified in the notice.\nThe University will not issue a notice of attendance to any witness who is not an employee or a student.\n\n5. Hearing\n\nAfter the pre-hearing conference, the hearing officer will convene and conduct a hearing pursuant to the University’s Hearing Procedures. The hearing will be audio recorded. The audio recording will be made available to the parties for inspection and review on reasonable notice, including for use in preparing any subsequent appeal.\n\nThe hearing will be conducted live, with simultaneous and contemporaneous participation by the parties and their advisors. By default, the hearing will be conducted with the hearing officer, the parties, the advisors, witnesses, and other necessary University personnel together in the same physical location. However, upon request of either party, the parties will be separated into different rooms with technology enabling the parties to participate simultaneously and contemporaneously by video and audio.\n\nIn the hearing officer’s discretion, the hearing may be conducted virtually, by use of video and audio technology, where all participants participate simultaneously and contemporaneously by use of such technology.\n\nWhile the Hearing Procedures and rulings from the hearing officer will govern the particulars of the hearing, each hearing will include, at a minimum:\n\n- Opportunity for each party to address the hearing officer directly and to respond to questions posed by the hearing officer;\n- Opportunity for each party’s advisor to ask", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-crime_and_law", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-crime_and_law/part-000-00000.npy", "text": " interview information, included in assessment report\n
\n
29 July: Draft list of interviewees and list of interview questions exchanged for feedback August: Interviews
\n
1. Draft list of interviewees 2. Finalise interview questions 3. Conduct interviews and compile information
\n
1. Draft interview questions 2. Feedback on list of interviewees
\n
\n
\n
\n\n
\n
Focus group discussions
\n
Focus group report, included in assessment report
\n
\n
5 August: Draft focus group questions September: Focus groups with staff October: Focus groups with students
\n
1. Finalise focus group questions 2. Jointly conduct focus groups 3. Review focus group report
\n
1. Draft focus group questions 2. Jointly conduct focus groups 3. Draft focus group report (2,500 words)
\n
\n
\n
\n
\n
\n
Objective
\n
Activity
\n
Output
\n
Deadline
\n
Budget Items
\n
SSI Responsibility
\n
Consultant responsibility
\n
Indicators and means of verification
\n
Risks and responses
\n
\n
\n
-----------
\n
----------
\n
--------
\n
----------
\n
--------------
\n
-------------------
\n
--------------------------
\n
-----------------------------------
\n
-------------------
\n
\n\n\nAPPENDIX 3: ADVICE ON CONDUCTING INTERVIEWS\n\nPreparation is the key to conducting an interview successfully. Interviewers should ensure that they are well prepared. Before the interview, the interviewer should:\n\n- prepare the interview environment (office or meeting room), and eliminate distractions, phone calls, conflicting appointments\n- review the interview questions to ensure they are sensitive to the interviewee’s place in the hierarchy of the institution and tailored accordingly.\n\nThe following steps ensure a sense of direction and control during the interview.\n\n
\n\n
\n
What to do
\n
How to do it
\n
\n\n\n
\n
1. Develop rapport
\n
• Break the ice with appropriate non-threatening topics<br>• Be friendly but avoid excessive small talk<br>• Present interview agenda/timing<br>• Let the interviewee know you will take notes
\n
\n
\n
2. Control the interview
\n
• Prevent rambling and unrelated discussions<br>• Make sure the interviewee answers your questions<br>• Use silence rather than avoid it: let the person think!
\n
\n
\n
3. Gather information
\n
• Use a variety of questions and question types<br>• Do not speak less than 10% or more than 25% of the time<br>• Rephrase questions if answers are not clear<br>• Be candid with your questions
\n
\n
\n
4. Seek a balanced picture
\n
• Avoid getting a one-sided picture of the situation<br>• Ask questions to get a balanced picture<br>• Ask for strengths and weaknesses, positives and negatives
\n
\n
\n
5. Take notes
\n
• Get key ideas/information and fill in details later
\n
\n
\n
6. Deal with questions
\n
• Make sure you give enough information to clarify<br>• Do not answer questions if you feel they are inappropriate
\n
\n
\n
7. Close the interview
\n
• Discuss the next steps in the gender self-assessment<br>• Give timeframe for future contact<br>• Leave door open to seek further clarification if needed
\n
\n
\n
8. Complete your notes
\n
• Right after the interview, complete your notes to record examples, anecdotes or any areas for further probing
\n
\n\n
\n\nAPPENDIX 4: SAMPLE GUIDELINES FOR A FOCUS GROUP\n\n1. INTRODUCTION: OBJECTIVES OF THE GENDER SELF-ASSESSMENT\n\nThe institution is undertaking a gender self-assessment. This aims to make the institution more gender responsive, by working out what we are doing well and where we might improve. Self-assessment looks at how the institution is working across a range of factors:\n\n- performance effectiveness\n- laws, policies and planning\n- community relations\n- accountability and oversight\n- personnel\n- institutional culture.\n\nTo undertake the institutional self-assessment we have worked at a number of different levels:\n\n- review of documentation\n- questionnaires\n- interviews\n- field visits.\n\n2. OBJECTIVE OF FOCUS GROUP\n\nTo have the opportunity to raise a few issues relating to gender relations and structures within the institution, and how gender is addressed in the services the institution provides to the community.\n\n3. A NUMBER OF SHORT PARTICIPATORY EXERCISES (IN TIME AVAILABLE)\n\n3i. Most important gender issues in country today?\n - Listing\n - Ranking\n\n3ii. Institution’s gender policy\n - Definitions of gender and gender mainstreaming\n - Clarification of gender mainstreaming →\n - Objective – gender equality\n - Strategy\n - Ensuring both women’s and men’s needs and interests are integrated into service provision and operations\n - Empowering women through participation and in decision-making\n - Outcome – gender equality and women’s empowerment\n\n4. DISCUSSION ABOUT GENDER RESPONSIVENESS OF SERVICE PROVISION\n\n‘Strengths, weaknesses, opportunities and threats’ (SWOT) exercise to explore:\n\n- main institutional strengths to be gender responsive in service provision\n- main weaknesses in being gender responsive in service provision\n- main opportunities that we can make use of\n- main constraints that we need to overcome.\n\n5. DISCUSSION ABOUT GENDER AND INSTITUTIONAL CULTURE\n\nFacilitated discussion of the following questions.\n\n- What gender issues do you think are important within the institution itself?\n- What are working relations between men and women like?\n- Why aren’t there more women at senior levels?\n\n6. OPEN DISCUSSION\n\n---\n\n10 These guidelines were adapted from Moser, C., *An Introduction to Gender Audit Methodology: Its Design and Implementation in DFID Malawi* (London: Overseas Development Institute, 2005), pp. 32–33.\nAPPENDIX 5: SAMPLE TEMPLATE FOR A GENDER SELF-ASSESSMENT REPORT\n\nTable of contents\n\nExecutive summary – highlights main points of report including background, methodology and process, and main conclusions and recommendations\n\nAcknowledgements – people instrumental in promoting or organising the self-assessment and carrying it out\n\nList of abbreviations and acronyms\n\nIntroduction – purpose of the institutional self-assessment and report, background to self-assessment including dates and process\n\nMethodology – how assessment was designed, how information was collected and analysed\n\nMain findings under each theme, including strengths and challenges:\n • performance effectiveness\n • laws, policies and planning\n • community relations\n • accountability and oversight\n • personnel\n • institutional culture\n\nGood practices – these can be included under findings, but it can be useful to create a separate section to highlight them\n\nRecommendations – if the terms of reference for the assessment foresee making recommendations\n\nAnnexes – including list of documents reviewed; list of interviewees; list of focus groups held; copy of any questionnaires used\n\nAPPENDIX 6: SAMPLE TEMPLATE FOR A GENDER ACTION PLAN\n\nYour organisation may already use an action planning tool that can be adapted for your gender action plan. Doing so may have the advantage that staff already understand how the planning tool works, and there may already be systems in place for monitoring and reporting on progress.\n\nThis gender action plan template is provided as an example of the elements that should be included in a gender action plan. It can be adapted to suit your organisation.\n\n
\n\n
\n
Area of work
\n
Activities [sample]
\n
When
\n
Where
\n
Responsible party
\n
With whom
\n
Resources
\n
Monitoring and reporting
\n
Evaluation
\n
\n\n\n
\n
Performance effectiveness
\n
Achieve 100% follow-up of complaints of domestic violence
\n
By end 4th quarter 2012
\n
All offices
\n
Chief constables
\n
Training unit, community organisations
\n
Core time, materials
\n
Quarterly; meeting of chief constables
\n
Data on follow-up of complaints
\n
\n
\n
Laws, policies and planning
\n
Create inter-departmental gender team with terms of reference (TORs)
\n
January 2012
\n
All offices
\n
National and regional heads of department
\n
Human resources
\n
Core time
\n
Monthly; meeting of heads of department
\n
Approved TORs
\n
\n
\n
Update gender policy
\n
Achieve 100% follow-up of complaints of domestic", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": "erscript{76}\n\nThe Integrated Nutrition Project (INP), the only study in this review to incorporate the CDT, was implemented among children from kindergarten to fifth-grade, Piaget’s preoperational and concrete operational stages which are unable to grasp abstract concepts.\\textsuperscript{38, 76} The INP used CDT model to ensure their program was suitable for the age and developmental levels of these children.\\textsuperscript{38} Hands-on activities such as food preparation and eating were incorporated to gather information by use of the senses.\\textsuperscript{38} Also, simple concrete messages were used, for instance “eat more of” whole grains, fruits, and vegetables so children would not have to decipher which foods were better or worse choices for them to consume.\\textsuperscript{38}\n\n**Educational theories of Dewey.** John Dewey was a philosopher of education who theorized that there is a connection between experience, thinking, and eventually the development of knowledge. Experience involves a combination of an active and passive constituent.\\textsuperscript{78} The active portion involves the experiment or a person doing something, and the passive portion involves consequences whether good or bad as a product to the\nMerely participating in an activity will not result in learning or generate knowledge. However, linking the consequences of an activity to the individual participating by reflection of changes occurred will produce the outcome of knowledge gained.\n\nDewey acknowledged the senses as an integral part to the development of knowledge. The senses are a “gateway” for moving information from the “external world” to the mind. Unlike the customary ways of scholastic learning, where students are expected to resist tendencies to incorporate their naturally energetic bodies in soaking up immense amounts of information into their minds, Dewey theorizes directing the use of those energetic senses with a set purpose for applied meaning of what is being taught. This enables children to use both their minds and their bodies in learning. The INP used SCT, CDT, and the educational theories of Dewey as a theoretical guide, which allowed for use of the senses in hands-on, age-appropriate activities as a means to increase fruit and vegetable consumption.\n\n**Tools of Assessment**\n\nReliable dietary assessment tools are crucial in evaluating the effectiveness of nutrition-based programs. In this review of literature, changes in FV consumption were evaluated by a variety of methods including 24-hour dietary recalls (self- or parental-reported), food records, lunch and/or snack-time observations (visual or weighed), and food frequency questionnaires (FFQ). Surveys and questionnaires to assess children’s FV preferences, knowledge, attitudes, self-efficacy, and other health-related characteristics were also conducted. In addition, questionnaires\nhave been given to children, lunch and school staff to assess the acceptability of the intervention.\n\nResearchers may face many problems when attempting to evaluate children’s dietary intakes, including poor knowledge of foods and portion sizes, literacy limitations, inability to describe mixed food dishes, and a brief attention span. Certain assessment tools may be more appropriate than others depending on the sample population; however, none of them are flawless. Since the focal point of this literature review is multi-component programs aimed at increasing FV intake among children, this section will address the validity of assessment tools aimed specifically at evaluating changes in FV consumption.\n\n24-hour recalls/food records. Quick and simple to conduct, 24-hour recalls generally ask children to report detailed information about everything they consumed for the past 24 hours, as well as estimate the portion sizes. Multiple 24-hour recalls can help to provide an estimate of food intakes without altering the usual consumption patterns of the child. Of the ten studies analyzed in this review, six incorporated some form of a 24-hour recall (see table 2.1).\n\nA significant disadvantage of 24-hour recalls is the reliance on memory. Baxter et al. referred to 24-hour recalls as a “memory test”, indicating the difficulty in remembering detailed information from a previous time period. Validation studies of 24-hour recalls have found that some children report intrusions (inclusion of foods not eaten) and/or omissions (failure to report foods eaten) in their recalls. Fourth graders who completed three separate food recalls validated against mealtime observations were found to have matched only 35% of foods observed eaten, 24% of foods reported were\nintrusions, and 41% of foods eaten were not reported. A study with third graders found they were able to recall 77.9% of the food they consumed in a 24-hour period with the help of unquantified food records, but of those foods reported 64.7% of the portion sizes estimated were inaccurate. Seventy-six percent of children incorrectly estimated the portion size of vegetables, with 60% overestimating. This finding is in contrast with Lytle et al., who suggested that fourth graders overestimate consumption of fruit, but correctly estimate vegetable intake. These studies point out that researchers should use caution in how they interpret data collected among children from 24 hour recalls, as there is a great deal of inconsistency.\n\nParental input on children’s 24-hour recalls has been speculated as whether or not that would improve the validity of the recall. One study presented moderate Pearson correlations (0.41 to 0.79) when comparing observed versus third graders’ self-reported intakes. Similar correlations have been seen in mother’s recall of children’s consumption. Basch et al. tested the validity of Latino mothers’ 24-hour recall for children between the ages of four to seven years-old. Correlations between mother’s recalls and trained observers ranged from -0.10 to 0.82 for major nutrients with an average of 0.51. Only 41.3% of mother’s reported vegetable consumption were the same as observed, with 28.3% over-reporting. Fisher et al. found that mother’s 24-hour recalls, for infants and toddlers less than two years-old, overestimated nutrients. Garceau et al. found parental input on dietary recalls necessitated substantially more time and resources than children’s self-reports and only resulted in a small effect of difference in mean nutrient intake. Restraints on time and resources should be evaluated in the decision of whether to use parent-assisted recalls.\nFood records are an alternative to 24-hour recalls. Food intake and portion sizes are recorded simultaneously with the consumption of meals, snacks, and beverages. Food records are usually recorded for three to seven days, including at least one weekend day. This method avoids reliance on memory and offers a more complete picture of usual eating patterns, but is time intensive and may result in diet modifications. For these reasons, along with the necessity to be literate, it appears that food records are not as commonly used in elementary school-based nutrition programs as an assessment tool. Only one of the ten studies in this review utilized food records to track changes in FV consumption. Unquantified food records, however, have been used as memory aids for 24 hour recalls.\n\nLytle et al. conducted a validation study of the reliability of 24-hour recall interviews in addition to unquantified food records among third grade students. A significant difference was found between observed versus recalled energy intake \\((p<0.05)\\), but there were no significant differences in actual sodium intake, or in the percentage of energy from total fat, saturated fat, monounsaturated fat, polyunsaturated fat, carbohydrate, and protein. In this study it was concluded that 24-hour recalls with the assistance of food records may be a beneficial assessment tool when comparing group means. Interestingly, in a later study by Lytle et al., food records to assist 24-hour recalls failed to show a positive cost and benefit outcome.\n\n**Mealtime observations.** Mealtime observations are frequently used in validation studies for 24-hour recalls and food records. They are an effective way to evaluate the success of FV interventions, because observations allow for the most precise assessment of food intake among children. Observations, though require a\nsignificant amount of time and are expensive. In this review of literature, 5-A-Day Power Plus and the High 5 Project conducted mealtime observations in addition to 24-hour recalls. The Integrated Nutrition Project, the Fruit and Vegetable Promotion Program, the School Garden’s Experiential Learning Approach Program, and the Food Dudes all utilized mealtime observations to assess consumption of FV.\n\nMost mealtime observations for school-based programs generally occur during the National School Breakfast and/or Lunch Programs. Trained research staff examine children’s food trays prior to and after eating each meal. The proportions of each variety of food consumed are determined by either weighing the food, digital photography, or visual estimation based on a specified protocol. Weighing the food before and after consumption will provide the most exact measurement of food eaten, but has the disadvantage of expense and requires an abundance of time. Direct visual observation and digital photography are less expensive and time-intensive, so provide more efficient assessment tools. These methods are similar to one another but instead of researchers directly observing meals, digital photographs of the meal are taken before and after consumption.\n\nBenefits of digital photography include being quick, more convenient, and allows for adequate assessment of consumption of the foods photographed. Swanson, in a plate waste study using digital photography, identified some of the issues involved when using digital photography. He indicated that items presented in the before photo, such as apples or bananas, were missing in the after photo. A little investigation revealed that students were encouraged to take the fruit with them to eat on the bus ride home or later that day. This made it more difficult to assess fruit intake. Swanson also found that it\nwas extremely difficult to assess the amount of small condiments consumed.\\textsuperscript{94}\n\nWilliamson et al", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " ethics. Course may be repeated once with a different topic of study.\n\nPHI 5311 Readings from the Philosophers (3) \nCross-listed as PSC 5311 \nPre-requisite(s): For Political Science or Philosophy graduate students only; or consent of instructor \nAn intensive, critical reading of selected works of major philosophers such as Plato, Aristotle, Augustine, Aquinas, Descartes, Locke, Hume, Kant, Hegel, Nietzsche, Heidegger, Russell, and Rawls. Other philosophers may be added to this list. May be taken a maximum of six times if different topic, not to exceed eighteen semester hours.\n\nPHI 5312 Topics in Classical Philosophy (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nA critical study of philosophers from the classical world; may include figures from the pre-socratic origins of philosophy to the times of epicurean and stoic philosophers, including especially Plato and Aristotle. Course may be taken up to three times with different topics for a total of nine hours course credit.\n\nPHI 5313 Topics in Action Theory (3) \nAn in-depth study of relevant recent and/or more classical philosophical literature on one or more selected topics such as free will, responsibility, practical rationality, decision theory, and intention. Course may be taken up to three times with different topics for a total of nine hours course credit.\n\nPHI 5314 Topics in Modern Philosophy (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nA critical study of philosophers from the Modern Period, including thinkers from the sixteenth to the nineteenth centuries. Course may be taken up to three times if topic is different for a total of nine hours credit.\n\nPHI 5315 Topics in Philosophy of Mind (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nA philosophical examination of the nature of the human mind and its relation to the body as well as theories that account for the nature of consciousness, intentionality, and other features of mentality. Course may be taken up to three times when topic is different for a total of nine credit hours for the course.\n\nPHI 5316 Contemporary Philosophical Problems (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nExamination of historical, normative, and analytical problems which have arisen in the history of philosophy and an examination of the systems of philosophy which have emerged from the consideration of these problems. May be taken six times if different topic, not to exceed eighteen semester hours.\n\nPHI 5318 Logic for Philosophers (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nIn this course the student should gain formal tools that are useful in a wide-range of areas of philosophy, including: propositional logic, quantificational logic, basic set theory, basic probability theory, and basic modal logic.\n\nPHI 5319 Philosophical Writing (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nThis course contains a significant amount of epistemology, metaphysics, and ethics. This course has as its goal mastering the art of writing a critical essay in philosophy, an essential skill for success in graduate school in philosophy and for publication success after securing a faculty position in philosophy.\n\nPHI 5320 Special Topics in Philosophy (3) \nPre-requisite(s): For philosophy graduate students only or by departmental approval \nSpecial research topics to be undertaken by students under direct supervision of the professor. Course may be taken a maximum of four times if different topic, not to exceed twelve hours.\nPHI 5321 Topics in Epistemology (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nCovers a broad array of issues concerning the nature of successful cognition of the sort sought after in purely theoretical activities. May focus on issues such as the nature and possibility of knowledge, the threat of skepticism, and the nature of rationality and justification, as well as on current controversies in the literature, including controversies with the value of knowledge, debates between foundationalists and coherentists, the Gettier problem, and many others. Course may be taken up to three times when the topic is different for a total of nine credit hours for the course.\n\nPHI 5322 Topics in Metaphysics (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nCovers a broad array of issues concerning the nature of being and reality, involving topics concerning God, the world, and the self. May focus on related topics such as ontology, category theory, substances and attributes, space and time, causation, and possible worlds. Course may be taken up to three times when topic is different for a total of nine credit hours for the course.\n\nPHI 5330 Readings in Ancient and Medieval Philosophy (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical readings course on primary sources and ancient and medieval philosophy. The course concludes with a comprehensive written examination over the sources.\n\nPHI 5331 Readings in Modern and Contemporary Philosophy (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical readings course on primary sources in modern and contemporary philosophy. The course concludes with a comprehensive written examination over the sources.\n\nPHI 5333 Seminar in Political Philosophy (3)\nCross-listed as PSC 5333\nSee PSC 5333 for course information.\n\nPHI 5342 Seminar on Religion, Law, and Politics (3)\nCross-listed as PSC 5342\nAn examination of the liberal and republican traditions of government and their relationship to church-state relations, with particular emphasis on how philosophers, legal theorists, and/or theologians assess the influence of both traditions on the American constitutional system. Among the topics that may be discussed are the debates about liberalism, religious liberty, religious establishment, the employment of religious reasons in a liberal regime, and the nature of public reason.\n\nPHI 5343 Classical Political Thought (3)\nCross-listed as PSC 5343\nSee PSC 5343 for course information.\n\nPHI 5350 Workshop in Teaching Philosophy (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nThis course will address a broad range of pedagogical issues involved in becoming a successful philosophy teacher. Topics include: educational theory, organizational strategies, practical techniques for effective lecturing, practical techniques for stimulating discussion, the logistics of evaluation, the scholarship of teaching and the importance of ongoing self-assessment of classroom performance.\n\nPHI 5353 Medieval Political Thought (3)\nCross-listed as PSC 5353\nSee PSC 5353 for course information.\n\nPHI 5360 Contemporary Ethical Theory (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical study of issues in contemporary ethical theory; may be taken up to three times with different topics of study, not to exceed nine semester hours.\n\nPHI 5361 Topics in Contemporary Philosophy of Religion (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nThis course investigates issues in contemporary philosophy of religion. Course may be taken up to three times with different topics, not to exceed a total of nine hours of course credit.\n\nPHI 5362 Issues in Contemporary Philosophy of Science (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical study of issues in contemporary philosophy of sciences; may be taken up to three times with different topics of study, not to exceed nine hours of course credit.\n\nPHI 5363 Modern Political Thought (3)\nCross-listed as PSC 5363\nSee PSC 5363 for course information.\n\nPHI 5365 Topics in Philosophy of Language (3)\nPre-requisite(s): For philosophy graduate students only or by departmental approval\nA critical study of issues in philosophy of language. Meaning, reference, intentionality and extensionality are among possible topics to be considered using primary sources in contemporary philosophy. May be taken up to three times with different topics not to exceed nine total credit hours.\n\nPHI 5393 Advanced Seminar in Political Philosophy (3)\nCross-listed as PSC 5393\nSee PSC 5393 for course information.\n\nPHI 5V99 Thesis (1-6)\nResearch, writing, and oral defense of an approved master's thesis. A minimum of six semester credit hours of PHI 5V99 is required.\n\nPHI 6V10 Prospectus Research (1-6)\nPre-requisite(s): PHI 5330 and 5331; and completion of regular course work\nSupervised research for developing and writing a Dissertation Prospectus Proposal that will be the subject of a preliminary exam that will admit students to candidacy. A student may repeat this course for credit, with a maximum of eighteen total hours.\n\nPHI 6V99 Dissertation (1-12)\nSupervised research for the doctoral dissertation.<|endoftext|>FOR IMMEDIATE RELEASE\nFebruary 28, 2017\n\nContact: Emma Vodick, 630.305.5250\nvodick@naperville.il.us\n\n523 S. Webster St. • Naperville, Illinois", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " According to Toke, “there is an acceptance of a broadly positivist position concerning the role of scientists as the legitimate bearers of truth…” (ibid.). However, Toke believes this to be completely unjustified and argues that it is time to move to a post-positivist position (ibid.). He concludes that moving to a social constructivist position “will lead us to a model of environmental policy that allows us to fully analyse the importance of various interest groups in shaping outcomes” (ibid.).\n\nThe very next year, Claire Dunlop wrote a response to Toke’s criticism of Haas. In her criticism, Dunlop critiqued Toke’s critique of Haas and critiqued Haas as well.\n\nOne of Toke’s biggest critiques of Haas’s work was that Haas gave too much value to epistemic communities over other special interest groups. However, Dunlop counters this argument by stating that Haas was attempting to fill a gap in major International Relations theory by moving “beyond the existing structure/agency binary … rather than attempting to establish a hegemonic position for epistemic communities over environmental groups” (Dunlop, 2000, 139).\n\nDunlop also critiques Toke’s understanding of Haas’s works. She argues that what Toke sees as a positivist approach is vastly overstated (ibid, 137, 139-140). In fact, Dunlop found that Haas’s approach is in line with social constructivists, and that Haas’s lack of coverage on positivism was another point against Toke’s accusation of Haas’s positivist approach (ibid, 139-140).\n\nHowever, Dunlop and Toke’s views do converge, when they criticize Haas for his weakness in explaining how epistemic communities and other special interest groups co-exist (ibid, 140-141). Dunlop argues that the uncertainty of an epistemic community’s political power contributes to this question of how epistemic communities and special interest groups co-exist (ibid, 141). Because epistemic\ncommunities need to cooperate with decision makers there is a risk that their “‘consensual knowledge’ may overstate the influence these expert enclaves alone can have” (ibid.). To rectify this problem, Dunlop says that Haas’s four characteristics (quoted earlier in section II) must be “problematized and their importance relative to each other elucidated” (ibid, 142). Dunlop concludes that more has to be done to test the characteristics of an epistemic community in order to know whether some characteristics can be more important than others, and how this affects competition between epistemic communities and other groups (ibid, 142). Such an effort can be referred to as a theory of competition (Cross, 2011, 24).\n\nRonald Krebs also sees a limit to the potential influence of epistemic communities not residing within government. He argues that their technical expertise may dominate decision making in government, but beyond such technical knowledge epistemic community theory does not explain “how state leaders acquire their information about basic issues in international relations.” (Krebs, 2001, 225-226.)\n\nAnother critique of Haas’s work on epistemic communities focuses on how epistemic communities actually turn their policy projects into policy when faced with competition from other groups. Dunlop, while suggesting how Haas’s theory’s problem with other groups could be improved, cited James K. Sebenius’s article in the special edition of International Organization. Dunlop agreed with Sebenius’s conclusion that in order for epistemic communities to gain influence, they must ‘bargain’ and make ‘winning coalitions’ with other actors in the policy making process. (Dunlop, 2000, 141-142; Sebenius, 1992, 326, 352.)\n\nSebenius argues that Haas’s theory of how epistemic communities influence policy making is wholly incomplete. Haas, according to Sebenius, misses the importance of epistemic communities strategically interacting with other groups and working to ensure their preferred policy outcome. Key to this is the shared beliefs of the actors. (Sebenius, 1992, 356.) “More generally, the translation of epistemic consensus into actual measures of policy coordination - that is to say the ultimate influence of the epistemic community - occurs through bargaining” (ibid, 357). However, Sebenius sees no theory of bargaining within the theory of epistemic communities. In fact, he states that Haas’s view on this matter is again “incomplete and misleading” (ibid.). He views the combination of consensual knowledge and bureaucratic power as a way to produce outcomes (ibid.). Ronald\nSebenius’s core criticism of Haas’s epistemic community theory is that Haas’s explanation of epistemic communities fails to explain explicitly how epistemic communities’ shared beliefs affect policy outcome (ibid.). As mentioned earlier, Sebenius's conclusion is that for an epistemic community’s shared beliefs to affect policy outcomes, the epistemic community must bargain with competing groups and form winning coalitions (ibid, 357-359). Ronald Krebs criticizes epistemic communities in a similar fashion. Krebs argued that even when military officers in America and Europe have formed something similar to an epistemic community, the truth remains that each one competes to control the agenda. (Krebs, 2001, 225.) Because of this, Krebs states that the persuasive power of an epistemic community is a rarer phenomenon than a predictable one (ibid.).\n\nAccording to Sebenius, when looking at an epistemic community as a de facto natural coalition, it is possible to hypothesize how they expand into winning coalitions. They would have “to be more influential in step with several factors: the greater their extent and depth, the stronger their cohesiveness, the more consistent their beliefs, the more resonant their policy project with outside scientific and popular opinion, the more opportune their bureaucratic placement, and the weaker their actual and potential opponents.” (Sebenius, 1992, 360.) Such an epistemic community would then have to negotiate its way to a winning coalition. Sebenius outlines five devices which an epistemic community can use to create a winning coalition:\n\n“First, to the extent that an epistemic community shapes perceptions of interests, it affects the psychological yardstick by which potential agreements as well as alternatives to negotiated agreement are measured … Second, to the extent that valuable new agreements are invented, the perceived conflict of interest may decrease still further … Third, if an epistemic community can cause issues to be linked in a manner that worsens the opponents' alternatives to agreement with its proposed policy project, this will shift the disagreement point and improve the chances that the community's project is accepted … Fourth, an epistemic community may advantageously affect the perceived zone of possible agreement to the extent that issues are framed and potential solutions or agreements are made salient in a way favorable to the community's policy project. Fifth, binding commitments to preferred outcomes may be possible” (ibid, 361).\n\nThis section of the paper has covered the criticisms of Haas’s epistemic community theory and shown how the theory’s critics have suggested it might be improved. As is the case for all theories, criticism unearths faults and underdeveloped\naspects of the theory, and it is a crucial part of the development of a theory. Next this paper will see how epistemic community theory has addressed these criticisms and developed over time.\n\n3.4 Cross’s Suggestions to Correct Criticisms\n\nTwenty years after this seminal edition of *International Organization*, Mai’a K. Davis Cross revisited the theory of epistemic communities. She argues that the theory of epistemic communities has not developed much since this edition of *International Organization*. In fact, with time Cross believes that the theory has become marginalized. Too often research has focused on scientists and technicians as the members of epistemic communities, and, according to Cross, this has limited epistemic communities. (Cross, 2013, 137-138.) Therefore, Cross has set out to reconceptualize the theory of epistemic communities.\n\nCross sets out to show that an epistemic community’s membership is not the driving force behind its persuasiveness, but rather its “internal cohesion and professionalism” drive its ability to persuade (ibid, 147). She “hypothesizes that if an epistemic community is not internally cohesive, then it is less likely to be as persuasive as one that is” (ibid.). In her work, Cross “identified four innovations [to the theory of epistemic community], which address: (1) the variation in internal cohesion within epistemic communities and the central importance of professionalism; (2) the role of uncertainty in understanding epistemic community influence; (3) the relationship between epistemic communities and governments; and (4) the nature of knowledge” (ibid, 147-148).\n\nWhen thinking of an epistemic community, it is easy to think of it in a simple binary way: either it exists or it does not. However, Cross argues that this is not the case. In fact, epistemic communities can exist at different degrees of being. Compared to other epistemic communities or actors an epistemic community may find itself in", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": ".\n\n### ELIGIBILITY\n- Must be at least 18 years of age\n- Must meet Office for People with Developmental Disabilities (OPWDD) eligibility requirements\n- Must be Medicaid eligible and active\n\n### COMMUNITY PRE-VOCATION\nAvailable in the Bronx and Rockland County\n\nCommunity Pre-Vocation prepares people for employment. The Foundling’s staff instructs in task completion, problem solving, and safety through job readiness workshops and volunteer work in a variety of sites throughout the community.\n\n**Highlights include:**\n- Discovery of individual interests and skills across many fields to identify a fulfilling career\n- Professional development seminars and workshops\n- Translatable on-the-job experience gained through unique volunteering opportunities\n\n**Volunteer sites include:**\n- Catholic Charities\n- Meals on Wheels\n- The New York Botanical Garden\n- Walgreens REDI Program\n- World Vision\n\n### SUPPORTED EMPLOYMENT\nAvailable in the Bronx and Rockland County\n\nSupported Employment offers people the opportunity to attain paid, permanent employment in the community.\n\nParticipants are placed in paid internships across neighborhood businesses while learning the skills needed for the job. Participants work with a job developer, whose purpose is to support in negotiating job placements, providing job coaching, assistance in interacting with employers, on-site training, and individualized supervision.\n\n**Highlights include:**\n- Job readiness classes on relevant topics (e.g. conflict resolution and workplace attire)\n- One-on-one job placement and coaching from an experienced mentor\n- Continued personalized support after securing employment\n\nINTERESTED IN LEARNING MORE?\nContact our Information & Referral Team:\n\nEmail: I&R@NYFoundling.org \nPhone: 212-886-4020\n\nVisit us online & watch our video!<|endoftext|>Georgia Library Spotlight - Baker Elementary Learning Commons\n\nEmily Brown\nBaker Elementary, emily.Brown@cobbk12.org\n\nFollow this and additional works at: https://digitalcommons.kennesaw.edu/glq\n\nPart of the Library and Information Science Commons\n\nRecommended Citation\n\nThis Columns is brought to you for free and open access by DigitalCommons@Kennesaw State University. It has been accepted for inclusion in Georgia Library Quarterly by an authorized editor of DigitalCommons@Kennesaw State University. For more information, please contact digitalcommons@kennesaw.edu.\nBaker Elementary Learning Commons\n\nThe Baker Elementary Learning Commons is an elementary school library serving over 800 students in grades K–5. Located in Acworth, Georgia, its mission is to inspire students to be great digital citizens, empower students to be independent readers, and for students to achieve a sense of lifelong learning.\n\nThe Baker Learning Commons has a lot of resources to help reach its mission. It has over 10,000 print books, over 900 ebooks, 16 computers, and 30 iPads. Staff and students also have access to the Cobb Digital Library, where they can access research databases such as encyclopedias, BrainPOP, and PebbleGo. In addition to all of this, students have Library PASS which allows them to use the Cobb County Public Library’s databases and check out any books from any branch with just their student number.\n\nStudents at Baker are welcome to visit the Learning Commons at any time during the school day (7:15 a.m. – 2:00 p.m.). Students are welcome to come on their own to check out books, read quietly, do schoolwork, etc. Students are also welcome to come as a group to do groupwork. Classes also rotate through the Learning Commons on a regular basis for lessons that incorporate digital citizenship, STEM, read alouds, research skills, and technology integration.\n\nTo learn more and see the wonderful lessons students participate in, please visit the website: http://www.cobblearning.net/bakermedia/.<|endoftext|>Focus for April is the special Moonshooter supplement, \"Are Americans Losing Faith in Their Colleges?\". Prepared nationally by the same people who produce a rather incisive weekly called \"Chronicle of Higher Education,\" the Moonshooter annually examines issues of importance to colleges and their alumni.\n\nTo accompany the Moonshooter piece is an alumni response from three University graduates. You will find their remarks in the center of the magazine.\n\nThe entire University community was saddened by the death of Gomer Jones in March. A brief report on Gomer and his career is on page 4.\n\nWe've been getting mild complaints about the Roll Call being printed on that colored paper, so this time it's on white. We'll see if that helps. The class notes are in the back of the magazine, and toward the front are the bits and pieces of local news called \"Campus Notes.\"\n\nNext issue a look at the recipients of the University's highest award, the Distinguished Service Citation, a Commencement round up, along with other articles of hopeful interest.—CBR\n\nThe Man from Drake — a new president for OU 2\n\nGomer Jones: 1914-1971—a pictorial memory of the man who was coach and counselor for the young men who made football more than a game at OU 4\n\nCampus Notes—the worthy of note and the worthy of nothing around the University 6\n\nAre Americans Losing Faith in Their Colleges— the annual Moonshooter supplement from Editorial Projects for Education 9\n\nAlumni Response—three alumni voice their opinions on the Moonshooter question 17\n\nRoll Call—the usual tidbits of alumni news around the world 21<|endoftext|>Grammatical performance in children with dyslexia: the contributions of individual differences in phonological memory and statistical learning\n\nMerel van Witteloostuijn1*, Paul Boersma1, Frank Wijnen2 and Judith Rispens1\n\n1Department of Linguistics, Amsterdam Center for Language and Communication, University of Amsterdam, Amsterdam, the Netherlands and 2Department of Linguistics, Utrecht Institute of Linguistics OTS, Utrecht University, Utrecht, the Netherlands\n\n*Corresponding author. Email: m.t.g.vanWitteloostuijn@gmail.com\n\n(Received 1 November 2019; revised 18 February 2021; accepted 9 March 2021; first published online 08 April 2021)\n\nAbstract\nSeveral studies have signaled grammatical difficulties in individuals with developmental dyslexia. These difficulties may stem from a phonological deficit, but may alternatively be explained through a domain-general deficit in statistical learning. This study investigates grammar in children with and without dyslexia, and whether phonological memory and/or statistical learning ability contribute to individual differences in grammatical performance. We administered the CELF “word structure” and “recalling sentences” subtests and measures of phonological memory (digit span, nonword repetition) and statistical learning (serial reaction time, nonadjacent dependency learning) among 8- to 11-year-old children with and without dyslexia (N = 50 per group). Consistent with previous findings, our results show subtle difficulties in grammar, as children with dyslexia achieved lower scores on the CELF (word structure: p = .0027, recalling sentences: p = .053). While the two phonological memory measures were found to contribute to individual differences in grammatical performance, no evidence for a relationship with statistical learning was found. An error analysis revealed errors in irregular morphology (e.g., plural and past tense), suggesting problems with lexical retrieval. These findings are discussed in light of theoretical accounts of the underlying deficit in dyslexia.\n\nKeywords: morphology; syntax; phonological memory; statistical learning; dyslexia\n\nIntroduction\nDevelopmental dyslexia (henceforth “dyslexia”) is a learning disability that is characterized by impaired reading and spelling in spite of normal intelligence and educational opportunities and in absence of sensory impairments (American Psychiatric Association, 2013; Snowling, 2001). Individuals with (a familial risk...\nof) dyslexia are known to experience difficulties in the area of phonological skills (Vellutino et al., 2004; see Melby-Lervåg et al., 2012 for a meta-analysis), which has led to the predominant view that the literacy impairments in dyslexia stem from an underlying phonological deficit. When learning to read and spell, children must acquire the correspondences between letters and sounds (i.e., graphemes and phonemes). If, however, the processing, storage, and/or representation of phonological information is impaired, children experience difficulties in the acquisition of grapheme–phoneme mappings that in turn result in problems with literacy acquisition (e.g., Ramus & Szenkovits, 2008).\n\nOver time, researchers have uncovered impairments in cognitive abilities other than literacy and phonological skills. These may involve general cognitive skills such as the processing of visual and auditory input (e.g., Stein & Walsh, 1997; Tallal, 2004), attention (e.g., Facoetti et al., 2000), and motor functioning (e.g., Ramus, 2003), but may also extend to language domains other than literacy and phonology, such as inflectional morphology and syntax (e.g., Rispens & Been, 2007; Robertson & Joanisse, 2010; Scarborough, 1990). Together, these observations have led to suggestions of a more general learning deficit in dyslexia (Nicolson & Fawcett, 2007, 2011), that is, a deficit of the domain-general ability to detect statistical patterns in sensory input, including spoken and written language (henceforth “statistical learning”, but note that Nicolson and Fawcett [2", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " Pregnancies, latest edition, edited by Gabbe, Niebyl and Simpson\n\nOB_GYN 6867: Obstetrical/Gynecological Outpatient\n\nObstetrical/Gynecological Outpatient\n\nCredit Hours: 5\n\nOB_GYN 6868: Urogynecology Selective\n\nThe 4th year medical student will work as part of a team providing hands-on clinical services in an inpatient, outpatient, and consultative setting. Students will participate in daily morning report, weekly didactic sessions, weekly surgical procedures and Friday afternoon seminars. Students will learn using a variety of evidence-based resources and direct faculty teaching. Students will also participate in weekly teaching didactics within the OB/GYN department such as Grand Rounds.\n\nCredit Hours: 5\n\nPrerequisites: Ob-Gyn Clerkship\n\nOB_GYN 6864: Obstetrics/Gynecology Offsite Advanced Selective\n\nObstetrics/Gynecology Offsite Advanced Selective\n\nCredit Hours: 5\n\nOccupational Therapy (OC_THR)\n\nOC_THR 1000: Introduction to Occupational Therapy\n\nIntroductory course to provide students information about the occupational therapy profession. Registered therapists lecture on clinical aspects. Students participate in discussions on program requirements, placement, and trends in the profession.\n\nCredit Hour: 1\n\nOC_THR 2001: Topics in Occupational Therapy\n\nOrganized study of selective topics in occupational therapy. Particular topics and credit hours may vary from semester to semester. Repeatable upon consent of department.\n\nCredit Hour: 1-99\n\nPrerequisites: freshman or sophomore standing; instructor's consent\n\nOC_THR 2005: Problems in Occupational Therapy\n\nIndependent investigation leading to the completion of a project or paper.\n\nCredit Hour: 1-99\n\nPrerequisites: freshman or sophomore standing; instructor's consent\nOC_THR 4001: Topics in Occupational Therapy\nOrganized study of selective topics in occupational therapy. Particular topics and credit hours may vary from semester to semester. Repeatable upon consent of department.\nCredit Hour: 1-99\nPrerequisites: junior standing; instructor's consent\n\nOC_THR 4060: Professional Issues\nIntroduction to the structures of the profession including professional association, philosophical and ethical perspectives and preparation for client contact. Includes experiential instruction in infection control.\nCredit Hour: 1\nPrerequisites: acceptance into the occupational therapy program.\nGraded on A-F basis only\n\nOC_THR 4085: Problems in Occupational Therapy\nIndependent investigation leading to the completion of a project or paper. Repeatable upon consent of department.\nCredit Hour: 1-99\nPrerequisites: Instructor's consent\nRecommended: Junior standing\n\nOC_THR 4220: Clinical Kinesiology\n(same as PH_THR 4250). This course for occupational therapy students examines the musculoskeletal system with special emphasis in body movements and the application of laws and biomechanical principles that govern movement in order to select and perform effective occupation-based treatment. Graded on A-F basis only.\nCredit Hours: 3\nRecommended: Acceptance into the occupational therapy program\n\nOC_THR 4240: Applied Neurophysiology for Allied Health Students\n(same as C_S_D 4430 and PH_THR 4240). Principles of basic neurophysiology, emphasizing correlation of structure and function of the nervous system. Graded on A-F basis only.\nCredit Hours: 3\n\nOC_THR 4270: Clinical Pathophysiology\n(same as PH_THR 4270). Interdisciplinary and case-based examination of the pathophysiology, prevention and general health management of disease/injury across the lifespan encountered in occupational and physical therapy practice. Graded on A-F basis only.\nCredit Hours: 3\nPrerequisites: successful completion of prior professional coursework\n\nOC_THR 4310: Foundations of Occupational Therapy\nHistory, contemporary practice, conceptual foundations, professional organizations and official documents of the OT profession are presented. Activity analysis, adaptation, and assistive technology are introduced in the context of promoting health and occupational participation. Graded on A-F only basis.\nCredit Hours: 4\nPrerequisites: PTH_AS 4222 with a grade of \"C\" or better\n\nRecommended: Admission to the Occupational Therapy professional program required\n\nOC_THR 4350: Rehabilitation Practice\nAnalysis of major disability areas from an occupational perspective. Administration and interpretation of assessments and application of treatment theories and approaches for deficits in movement, sensation, cognition and perception. Graded on A-F basis only.\nCredit Hours: 4\nRecommended: Must be admitted to the Occupational Therapy Professional Program\n\nOC_THR 4390: Lifespan Assessment\n(cross-leveled with OC_THR 7390). Basic evaluation skills in occupational therapy practice across the lifespan are introduced. This course provides an introduction of the essentials of occupational therapy evaluation: interviewing, screening, assessment, and report writing in general contexts across the lifespan. Enrollees will also receive an introduction to basic clinical reasoning skills required for instrument selection, interpretation of findings, and application to treatment planning. Graded on A-F basis only.\nCredit Hours: 4\nPrerequisites: Restricted to Occupational Therapy students only\n\nOC_THR 4420: Lifespan Occupations I\nOverview of typical development from infancy through adolescence from an occupational perspective. Emphasis on the impact of personal and contextual factors on occupational development in children and adolescents. Graded on A-F basis only.\nCredit Hours: 2\nPrerequisites: Admission to Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for Undergraduates)\n\nOC_THR 4422: Fieldwork I - Children\nDevelopment of clinical observation skills via on-site observation of children with typical and atypical development. Opportunities to gather and organize data, plan and implement activities, and develop therapeutic relationships with children and their care providers. Graded on S/U basis only.\nCredit Hour: 1\nPrerequisites: Admission to Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for undergraduates)\n\nOC_THR 4450: Pediatric Practice\nLecture and laboratory course designed which addresses Occupational Therapy pediatric frames of reference and theories. Common conditions seen in Occupational Therapy practice as well as interventions such as feeding, positioning, facilitation of movement and sensory strategies are also addressed. Graded on A-F basis only.\nCredit Hours: 4\nRecommended: Admission to the Occupational Therapy professional program\nOC_THR 4520: Fundamentals of Occupational Therapy\nThis course will provide an overview of disability across the lifespan, including personal and professional interactions. Professional values, ethics and advocacy are also emphasized. Graded on A-F basis only.\n\nCredit Hours: 4\nRecommended: Restricted to students currently enrolled in the Occupational Therapy Program\n\nOC_THR 4620: Lifespan Occupations II\nOverview of biopsychosocial development and the aging process from young adulthood through older adulthood from an occupational perspective. Emphasis on the impact of client and contextual factors on occupational development and loss of occupations throughout the adult lifespan. Graded on A-F basis only.\n\nCredit Hours: 2\nPrerequisites: Admission to the Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for undergraduate; B or better for graduate)\n\nOC_THR 4622: Fieldwork I Older Adults\nDevelopment of evaluation and intervention skills via on-site interaction with older adults in a residential facility. Opportunities to gather data, plan/implement activities, document client performance, and develop therapeutic relationships with older adults and care providers. Graded on S/U basis only.\n\nCredit Hour: 1\nPrerequisites: Admission to the Occupational Therapy professional program and satisfactory completion of all previous professional program coursework (C or better for undergraduate; B or better for graduate)\n\nOC_THR 4650: Lifespan Interventions\nThis course provides a foundational overview of common treatment theories and frames of reference that guide intervention planning across the lifespan. Graded on A-F basis only.\n\nCredit Hours: 4\nPrerequisites: OC_THR 4310 and OC_THR 4520. Restricted to students who are currently enrolled in the Occupational Therapy Program\n\nOC_THR 4670: Hand and Upper Extremity Intervention\nTo gain entry level skills needed to evaluate and treat common upper extremity conditions, including acute injuries and cumulative trauma disorders. Graded on A-F basis only.\n\nCredit Hours: 2\nPrerequisites: PTH_AS 4222 or PTH_AS 7222, OC_THR 4220 or OC_THR 7220, OC_THR 4390 or OC_THR 7390\n\nOC_THR 4750: Cognition Across the Lifespan\nThis course introduces students to theoretical models, assessment, and treatment in cognitive rehabilitation. Graded on A-F basis only.\n\nCredit Hours: 2\nRecommended: Restricted to Occupational Therapy Majors\n\nOC_THR 4770: Community-Based Practice\nFocus on role of occupational therapy in prevention, health and wellness. Program development and evaluation completed through community needs assessment and completion of health promotion project. Graded on A-F only basis.\n\nCredit Hours: 3\nPrerequisites: acceptance into major and completion of program year 1\n\nOC_THR 4920: Clinical Documentation\nDevelopment of observation and assessment skills related to effective documentation of occupational therapy services. Emphasizes exposure to various clinical settings, and third party payers, and legislative policies impacting documentation. Graded on A-F basis only.\n\nCredit Hours: 2\nRecommended: Restricted to students admitted to the professional program", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " Strategic Plan Goal 1, Increasingly provide access to digital collections and services to support instruction, research, and outreach, while improving access to the UNLV Libraries’ print and media collections.\n\n- Participated in the development of a plan and procedures for weeding. Completed a shift of the fourth floor of Lied Library. Shifting on the fifth floor was begun.\n- The entire main collection was shelf read during the period of July-September. Most of the third and fourth floors, and all of the fifth floor were shelf read during the fall semester. Parts of all three floors have been shelf read since then.\nLibraries Strategic Plan Goal 2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations.\n\n- LASR retrieval process was improved by increased staff coverage of the area.\n- Worked with Libraries Systems staff to facilitate the process for registering new students for library privileges.\n- Implemented manual hold processing as a preliminary step to implementing automatic hold processing in the future. This function is not working as envisioned.\n\nOther accomplishments\n\n- Worked with Systems staff to develop a batch import process for extending the expiration dates of continuing students’ library cards each semester. This eliminated the problem of all UNLV students’ cards expiring on October 1. The next phase will automate the process to the maximum extent that the system will allow.\n- Approximately 243 remote user accounts were set up using the online form provided for Distance Education students to apply for library barcodes.\n\nII. Statistical Data\n\n- The number of visits to Lied Library was up by 5% this past year. While the total number of books checked out remained about the same, the number checked out through the Self Checks increased again, this year by 10%. It appears that each year, more library users are becoming aware of the Self Checks, and using them.\n- Total renewals rose only slightly (2%), but there was a 9% increase in the number of books renewed online.\n- In-house use of the main stacks increased by 20%. However, the number of LASR requests decreased by 5%.\n- There was a 29% decrease in the number of new books shelved, a reflection of fewer volumes purchased than in previous years.\n- Physical reserve checkout dropped from 10,463 to 5,400 (48%), which was expected, since anything that can be scanned is now put on electronic reserve. The number of \"hits\" recorded for use of electronic reserves July 2003-June 2004 increased 39% over last year's count, which was begun in August of 2002 (August 2002-July 2003).\n- Patron assistance at the circulation desk decreased 20%. Patron assistance for physical reserves decreased by 62%.\n- Both the number of books paged from UNLV by CCSN, and from CCSN by UNLV decreased by about 20%.\n- We received $3,731.14 from our collection agency, which is a 5% increase from last year’s $3,559.57.\nInstruction Department\nDiane VanderPol\nHead Instructional Services Librarian\n\nI. Accomplishments, Activities and Highlights\n\nLibraries Strategic Goal 3, Initiate strategic collaboration efforts and programming to ensure that UNLV graduates information literate students. Department Goal Objective, Continue to provide the most appropriate and up to date instruction in research and information literacy skills.\n- Consistently offered course-related instruction, orientation programming both in and out of the Library, and scheduled drop-in sessions, tours and more (see also Statistical Data section).\n- Offered a faculty seminar series in both fall and spring semesters designed to encourage faculty to think about the development of their students’ information and research skills and also about their own research needs.\n\nLibraries Strategic Goal 2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations. Department Goal Objective, In order to promote the development of teaching skills for Libraries faculty and staff so that they might better serve users in the classroom environment, the department will propose a plan for regular developmental evaluation and will provide a series of opportunities for professional development in the area of teaching skills.\n- As this project took shape, it became clear that the developmental activities should not be evaluative in nature so that experimentation and improvement could be encouraged in a non-threatening environment. Members of the department developed and deployed the Enhancement Project, an opportunity for structured peer-support at the class planning stage. The project included an introductory workshop led by Leora Baron of the Teaching Learning Center, individual participation by volunteer instructors, assessment forms, and a follow-up meeting of participants.\n\nLibraries Strategic Goal #2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations. Department Goal Objective, The department will participate in the Association of Research Libraries (ARL) sponsored Project SAILS (a project for the standardized assessment of information literacy skills) to help determine a baseline information literacy competency level and to subsequently determine appropriate instructional services.\n- The department administered the on-line Project SAILS test to 225 students during the spring semester. The department prevailed upon regular users of the Libraries’ instructional services in order to find sufficient students to participate. Results from the ARL organizers have only recently been returned. Overall results suggest that UNLV students are very similar to students across the nation in their abilities to score well on the standardized instrument. It remains unclear how the results of our participation will be used at an individual institution level. Project SAILS organizers are hopeful, however, that a standardized instrument to measure information literacy will be created from these efforts.\nLibraries Strategic Goal 3, Initiate strategic collaboration efforts and programming to ensure that UNLV graduates information literate students. Department Goal Objective, The department will take advantage of the hardware and software in the new Multimedia Design Studio to create learning tools for library staff and subsequently for students and other members of the UNLV community.\n\n- The department brought the Multimedia Design Studio into being and hired a student employee to help staff the studio for its first semester of operation. This student, in conjunction with Public Service Intern, Michael Yunkin, provided service to users with a variety of needs, primarily those connected to digital video manipulation. Additionally, Michael Yunkin and Diane VanderPol developed a short promotional video utilizing the hardware and software for the studio. Michael Yunkin also created a tutorial to introduce staff to one of the common processes available in the studio and the student employee created several handouts on a particular software featured in the studio.\n\nII. Statistical Data\n\nCombined totals for all types of programming offered by the Instruction Department including tours, both pre-scheduled and course-related class sessions, orientation sessions and sessions for faculty, students, staff, and members of the local community continue to grow steadily. In FY04 the department offered nearly 500 programs to over 10,000 people, approximately 20 more sessions with participation of more than 1,500 more people than FY03. Course-related sessions continue to make up 64-65% of our total offerings. The most significant growth area was the number of participants in the pre-scheduled sessions. Attendance at pre-scheduled sessions nearly doubled from the previous year. The department’s marketing of pre-scheduled classes to teaching faculty as a potential source for extra credit points for students may be the cause of the increase. Tours and brief sessions the department provides to non-affiliated groups such as CCSN students, Elderhostel participants, high school students, and others more than doubled in FY04. Increases in other services offered by the Instruction Department were generally steady.\n\nMedia and Computer Services Department\n(formerly Media Resources)\nJennifer Church\nHead, Media and Computer Services\n\nI. Accomplishments, Activities and Highlights\n\nDuring FY04 fiscal year, the Media and Computer Services Department embarked on multiple projects.\n\n- Began systematically replacing frequently used items in 3/4\" format, due to a shortage of players across campus, with VHS or DVD and investigating the cost and copyright implications of transferring those items unavailable for purchase in a more usable format.\n- Began preparations to move little used laser discs and albums to Lied Automated Storage and Retrieval (LASR) and to replace frequently used laser discs.\n- Testing new images for desktop and laptop implementation.\n- Initiated project to identify all hot ports within Lied Library.\n• Participated in providing computer training opportunities for Research and Information Department staff.\n\nStrategic Goal 1, Increasingly provide access to digital collections and services to support instruction, research, and outreach, while improving access to the UNLV Libraries' print and media collections.\n• Work on the Safari/Classroom Building Complex project continues. Progress is slow.\n• Explored options to make Media Subject Guides available on the Web and began providing content to the Web and Digitization Services Department for inclusion in a searchable database.\n\nStrategic Goal 2, Actively foster user-focused environments committed to identifying and delivering information resources and services that meet or exceed user expectations.\nImplementation Strategy 2.1, Library groups will develop assessment tools for determining user needs and expectations as they relate to services and facilities. Implementation Strategy 2.2, Each department will evaluate and respond to identified user needs and expectations.\n• Continued to conduct laptop checkout satisfaction surveys. These surveys showed an overall high level of satisfaction with the program. There were a few concerns about availability during peak times (all laptops checked out at once) and the check-in/check-out procedure was perceived by some as a bit cumbersome.\n• Conducted several computer workshops for Research and Information staff, including basic help with WebCT and dealing with common computer problems.\n\nII. Statistical Data\n\nComputer Help Desk: Total patron contacts for the fiscal year increased approximately 3%. This represents a slower level of growth than in", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": ", what would be her opportunity cost?\n A. Bike\n B. Gameboy\n C. Doll\n D. Clothes\n\n**Correct answer:** A. Bike\n\n*Constructed response (Handout 2)*\n\n**Prompt:** The 21 students in Mrs. Smith’s first grade class voted for which animal to have as a class pet. The results are in the graph below.\n\n![Graph showing animal preferences]\n\nWhat was the opportunity cost of their choice? Explain your answer.\n\n**Sample Response:**\nThe opportunity cost was the bird. The bird, which was their second favorite. They had to give up the bird.\n\n**Rubric:**\n2= The response states the opportunity cost and gives a relevant explanation.\n1= The response states the opportunity cost, but provides an inaccurate, irrelevant or no explanation.\n0= No response.\n\n**Objective(s):**\nStudents will be able to:\n • explain that choices must be made when wants exceed available resources;\n • define the opportunity cost as the second choice of a decision;\n • make decisions and explain the reasons for their choices; and\n • state the opportunity cost of a decision.\n\n**Prior Knowledge and Skills:**\nStudents should be familiar with the following economic terms:\n\n- **want** – an expressed desire satisfied by a good or service\n- **choice** - something chosen; a preference\n\n**Time to Complete:** 2 sessions, approximately 30-45 minutes each\n\n**Materials/resources needed:**\n- Book -- *How Much Is That Doggie in the Window?* as retold by Iza Trapani\n- Transparency money or play money -- $11.50 in dollar bills and coins\n- Visual 1 -- Graphic organizer (could also be reproduced as a poster)\n- Visual 2 -- Caught Being Good, constructed response (whole group)\n- Transparency marker\n- Handout 1 -- multiple choice assessment (one per pair of students)\n- Handout 2 -- constructed response assessment (one per student)\n- Definition cards (included with lesson)\n\n**Procedure:**\n\n1. Ask the students:\n - Have you ever wanted something very badly?\n - What did you want?\n - Did you have enough money to buy the item?\n\n2. Explain that the little boy in this story finds something that he really wants, but he doesn’t have enough money to buy it.\n\n3. Show the cover. Share the title and author information.\n\n4. Based on the title, have the children predict what the boy wants. *(doggie)*\n\n5. Begin reading the story aloud and displaying the pictures. Pause when the shopkeeper tells the little boy that he doesn’t have enough money. Ask:\n a. How much does the puppy cost? *(*$60, or $55 after the owner offered to take $5 off the asking price.*)*\n b. How much money does the boy have? *(*$11.50)*\n c. What are the boy’s choices? *(choose something else, save his money, ask his parents to buy the doggie for him)*\n d. Why does he have to make a choice? *(He doesn’t have enough money to buy the doggie.)*\n\n6. Read the next text page of the story. Explain that since the boy does not have enough money to buy the doggie, the shopkeeper suggests some alternatives. Ask: What is an alternative? *(Answers will vary; alternatives are the different possibilities you can choose from in a situation.)* Display the Alternatives definition card.\n7. Ask: What are the alternatives the shopkeeper suggests? *(hamster, gerbil, mice, lizard, snake)* Why does he suggest those animals? *(They cost less than the doggie and the boy had enough money to buy one of those.)* What choice would you make if you were in this situation? *(Answers will vary.)*\n\n8. Read the next 2 text pages (stop after the lemonade stand). Ask: How is the boy planning to earn money? *(selling lemonade)* Is he successful? *(No)* Why not? *(It rained, so no one bought a drink.)*\n\n9. Read the next 2 text pages (stop after the boy’s decision to buy frozen yogurt for his sister). Display Visual 1. Ask: What is the boy’s goal? *(to buy the doggie)* Write “doggie” in the Goal box.\n\n10. After the boy’s sister hurts herself the boy has a choice to make. Ask: What does he choose to buy with his money? *(frozen yogurt for his sister)* Under Choice #1, write “yogurt” in the top box.\n\n11. Ask: By buying the yogurt, what does he give up? *(saving money to buy the doggie)* Explain: The choice he gave up is called **opportunity cost**. Explain that opportunity cost is the alternative that is given up when a choice is made; a person’s second choice.) Display the *Opportunity cost* definition card. On the transparency, write “saving for the doggie” in the second box under Choice #1.\n\n12. Ask again: When he has a choice between yogurt and saving to buy the doggie, what choice does he make? *(buying frozen yogurt)* Circle “yogurt” on the transparency. Ask: What was his opportunity cost? *(saving his money to buy the doggie)* Cross out “saving for the doggie” on the transparency.\n\n13. Explain: The word **costs** means the bad things about a choice. Display the Costs definition card. Ask: What is the cost of the boy’s choice? *(The boy has less money and is farther away from his goal of buying the doggie.)* Explain: The word **benefits** means the good things about a choice. Display the Benefits definition card. Ask: What are some benefits of the boy’s choice? *(He makes his sister feel better, and he has a good feeling inside.)*\n\n14. Say: Let’s pretend that the frozen yogurt costs $2.00. Display $11.50 of transparency money or hold up play money. Have a student remove $2.00 of the transparency (play) money, then have the students count the money that is left. *($9.50)*\n\n15. Read the next page of text (about Mom). Recording the answers on Choice #2 on the transparency, ask:\n\n a. At this point in the story, what are the boy’s choices? *(whether to buy chocolate candy for Mom or save his money to buy the doggie)* Write chocolates and saving for the doggie on the transparency.\nb. What choice does he make? (*chocolates*) Circle that choice on the transparency.\nc. What is his opportunity cost? (*saving to buy the doggie*) Cross out that choice on the transparency.\nd. Are there any benefits from his choice? (*Yes – he made Mom feel better, and he had a good feeling inside.*)\n\n16. Say: Let’s pretend that the box of chocolates costs $6.00. Have a student remove $6.00 of the transparency (play) money, then have the students count the amount of money left. ($3.50)\n\n17. Read the next page of text about Dad. Recording the answers on Choice #3 on the transparency, ask:\n\na. What are the boy’s choices? (*whether to buy tissues for Dad or save his money to buy the doggie*) Write tissues and saving for the doggie on the transparency.\nb. What choice does he make? (*tissues*) Circle that choice on the transparency.\nc. What was his opportunity cost? (*saving to buy the doggie*) Cross out that choice on the transparency.\nd. Are there any benefits from his choice? (*Yes – he made Dad feel better, and he had a good feeling inside.*)\n\n18. Say: Let’s pretend the box of tissues costs $3.00. Have a student remove $3.00 of the transparency (play) money, then have the students count the amount of money left. ($1.50)\n\n19. Read the next page of text. Ask: How does the boy feel now? (*sad, disappointed*) Do you think that he is happy now with the choices he made along the way? (*Answers will vary.*) Ask students to predict how the story might end.\n\n20. Read to the end of the story.\n\nClosure:\n\n1. Review the story by asking the following questions that incorporate the economics vocabulary:\n\n a. What did the boy want? (*the doggie in the window of the pet shop*)\n b. When the boy could not afford the doggie, what alternatives did the shop keeper suggest? (*animals that he could afford*)\n c. What choices did the boy make? (*He chose to buy yogurt, chocolate, and tissues.*)\n d. What were the benefits of those choices? (*He felt good because he helped others, and others recognized his kind acts.*)\n e. What was the opportunity cost for each of these choices? (*saving money for the doggie*)\n2. Pose the following situation. Students in a scout troop must decide between a trip to the train museum or a trip to the aquarium. The troop votes to go to the aquarium. Ask students what is the opportunity cost of going to the aquarium. (going to the train museum)\n\n3. Review with the students that the boy in the story really wanted something. Because of limited resources, he had to make choices and incur the costs and benefits of those choices. Explain that sometimes we have a choice of more than two alternatives. Also, we often make a choice as part of a group, which means we don’t always get our personal choice.\n\n4. Display Transparency 2", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " of brand associations, is perceived quality. This is explained as not the actual quality of a certain brand's product, but the consumers' perception of the quality. The fourth and final dimension of consumer-based brand equity, which is also described as the major component, is brand loyalty. Brand loyalty is shortly described as \"the attachment that a consumer has to a brand.\" (Pappu, 2005, p. 145; Aaker, 1991, p. 39). He goes on further to emphasize that brand loyalty is the major component of consumer-based brand equity. When explaining the relationships between the four dimensions, mentioned above, Pappu (2005) proposes that consumers' perception of quality is associated with brand loyalty. The more brand loyal the consumer is, the more likely it is perceived by the consumer that better quality is offered, vice versa. As, the more superior associations the consumer has for a brand, the more loyal, vice versa. Since brand loyalty is a major component of consumer-based equity, it is of interest to find other definitions and measurements of brand loyalty.\n\nAssael (1994, pp.151-152) describes brand loyalty as a “favorable attitude toward a brand resulting in consistent purchase of the brand over time.” It is stated by Assael that there are two main approaches to brand loyalty. The behavioral approach in brand loyalty is defined by the sequence of purchase, for example, Assael mentions that according to Brown, if the same brand is purchased five times in a row (Assael, 1994; Brown, 1952). The other approach to brand loyalty is the cognitive approach, which includes both attitudinal and behavioral components in measuring brand loyalty.\nJensen and Hansen (2006) explain, in their empirical study on brand loyalty, that simply viewing the behavioral approach in determining brand loyalty is not comprehensive. From the attitudinal perspective, it is more likely that researchers will be able to investigate the factors producing brand loyalty.\n\nAssael (1994) then draws the connection between brand loyalty and product involvement. He explains that a habit of buying a certain brand is not necessarily brand loyalty. Only when comes to a high involvement situation can a purchase be considered brand loyalty. If the decision is made out of habit and where the consumer has little involvement it is signified by inertia (see figure 2, \"Four types of consumer behavior\").\n\n### 3.5 Consumer involvement\n\nConsumer involvement has been viewed both in terms of product meaning and in terms of consumer-product relationships. For example, involvement has been equated with the importance of the purchase, and has also been used in different involvement profiles based on meaning, value, and the nature of relationships between consumers and product categories. Furthermore, involvement has been defined as a relation between consumer and product, and found to be the relational variable most predictive of purchase behavior (Martin, 1998).\n\nQuester and Lim (2003) also separate involvement into product involvement and purchase involvement, where product involvement is found to be the more permanent (enduring) and consumer-based concept. Quester and Lim (2003) argue that a consumer may be highly involved in a purchase situation without really being involved with, or interested in, the product category or brand that they are purchasing. They also highlight that, in contrast, a consumer may have very low purchase situation involvement due to high product involvement (tied with, for example, brand loyalty). Many researchers have tried to measure product involvement in an \"either high or low\" manner, despite the risk of oversimplifying complex cause and effects. Furthermore, one should keep in mind that it is not the products themselves that are (or are not) involving; it is the consumer that chooses\nto be involved, meaning that product involvement is a consumer response to a given product, not a product’s inherent attributes (Quester and Lim, 2003).\n\nAssael (1994) proposes the above matrix (Figure 2) as an explanatory division of consumer decision-making based on involvement and the degree to which a decision is necessary. The complex decision-making is the traditional view of decision-making (see figure 3, \"a model of consumer involvement\"), where it is assumed that consumers gather information and thoroughly evaluate it before they act. Brand loyalty, as described in chapter 3.4, is assumed to occur in habitual high involvement purchases.\n\nThe inertia (lower right-hand box) in the above matrix is signified by decisions made with little information processing, followed by an evaluation of the brand after the purchase. This is comparable to a consumer who is unwilling to make a\ndecision, and as long as repeated purchases of the same brand reach a minimum level of satisfaction, the consumer is unlikely to change behavior. Studies have shown that the best way to succeed with products in this part of the matrix is through creation of brand awareness (best accomplished by repeat advertising) to change consumers' beliefs, since beliefs is the primary variable on which consumers act in this part of the matrix (Assael, 1994).\n\nLimited decision-making, making a consumer switch from the previously described inertia, can occur, for example, if a new product is introduced or if the consumer starts seeking variety. However, one should keep in mind that this is based on passive learning, since no active search for information, or brand evaluation, occurs. Generally, the products in this part of the matrix are considered negligible or mundane by consumers (Assael, 1994).\n\nThere are, however, ways to look at what makes products important to consumers. Assael (1994) suggests the following conditions for product involvement:\n\n- The product is important to the consumer (tied to consumers' self-image).\n- The product (or product category) interests the consumer.\n- The product comes with certain risks; for example, there is the technological risk in buying a high-tech product (buying more functions/technology than you will ever know how to use).\n- The product has emotional appeal to the consumer.\n- The product is associated with a certain group (status).\n\nThe above conditions are closely related to what Kapferer and Laurent (1985a; 1985b) list as their conditions for consumer involvement in general:\n\n- Perceived importance of (or personal interest in) the product.\n- Perceived risk associated with the purchase:\n - Perceived importance of negative consequences in case of poor purchasing decision.\n - Perceived probability of making such a decision.\nSymbolic value of the product, the purchase or the consumption of the product (\"self-expressing\" or associated value attributed by the consumer).\n\nHedonic value of the product; for example the product's ability to provide pleasure and the emotional appeal of the product.\n\nThe main difference between these two types of conditions is the latter one's addition of situational risk, meaning that the risks and probability of making a bad choice has been taken into account.\n\nAssael (1994) suggests the following model (Figure 3) as a description of what leads to complex decision-making:\n\n\n\nAs shown in the model, there has to be a need for a higher level of information processing before a complex decision can or will be made. However, as previously mentioned, some purchases are made without the need for a higher level of information processing; namely, habitual or uninformed purchases made without any real consideration, or without regard to risks (Assael, 1994).\nSeveral ways to try to measure involvement have been developed over the years; various scales have succeeded or supplemented each other, and one widely used scale is a uni-dimensional generic scale initially developed by Zaichkowsky in 1985 (Martin, 1998).\n\nThe Personal Involvement Inventory is designed to measure a person’s involvement with products, advertisements or purchase decisions (Zaichkowsky, 1985). It originally consisted of 20 items, but was later revised and narrowed down to 10 items by the original author (Martin, 1998; Zaichkowsky, 1994). However, this way of measuring includes other factors than just the consumer involvement, which is the focus of this dissertation.\n\nKapferer and Laurent (1985b) also developed a recurrent means to measure consumer involvement (Quester and Lim, 2003), briefly mentioned above. It is centered on the same four conditions listed above (perceived importance, perceived risk, symbolic value and hedonic value), and is measured in accordance with their article \"Measuring Consumer Involvement Profiles\".\n\n3.6 Research model\nThe above literature review provides a brief summary of what occurs within the consumers’ mind during a purchase decision-making process. We have chosen to emphasize on the concept of the consumers' level of involvement. Furthermore, it highlights the relationship between involvement and consumer-based brand equity. It is in our interest to explore the nature of this relationship, by conducting an attitudinal empirical investigation, and find implications on how much consumer-based brand equity affects involvement in product categories of different involvement levels.\n\nSimilar research of the complex relationship between involvement and different aspects of brands has already been conducted. Quester and Lim (2003) states that more research needs to be done in examining the link between product involvement and brand loyalty. Their research even lends support from previous\nfindings that a relationship exists (Quester, 2003; LeClerc and Little, 1997, and Iwasaki and Havitz, 1998). We thereby believe that there is no question whether there is an existing relationship or not. The previous research of Quester and", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": "FA development.\n\n• Gathering allies and creating alliances for program growth and expansion.<|endoftext|>Wupatki Outing with Mr. Oelerich and Ms. Hillyard’s 4th Grade Classes by Sabrina Carlson\n\nOn April 27, 2016, I had the privilege of presenting to the 56 students of Mr. Oelerich and Ms. Hillyard’s classes at Puente de Hozho Elementary School on Leave No Trace Ethics, outing expectations, and the Hug-A-Tree curriculum. We had a discussion about what trash really is (yes, your apple core is trash), and what a special treasure places like Wupatki National Monument is for our country. The students were empowered with the knowledge of what to do if they ever get lost in the woods, and they all agreed that staying in one place would be the best plan, even if it might feel scary at times. Many students had concerns and questions about how to know if someone looking for them was Search and Rescue or a stranger. It comforted them to know that Search and Rescue volunteers will always have a radio and identification. When our presentation was finished, each of the students received a basic survival kit to always keep with them when adventuring in the outdoors. The kit contained a poncho, emergency blanket, glow sticks, signal mirror, and whistle. While I hope none of those young people ever need it, I’m thrilled to know that these students now have the knowledge to keep themselves safe if they are ever separated from their families while outdoors.\n\nOn May 4, we took our newly found outdoor confidence to Wupatki National Monument to learn about the history and culture of the ancient people who once lived there.\n\nWhen the class arrived at Wupatki we divided everyone into two groups to start the activities. We discussed the concept of “fundamental human needs,” which is the common ground that all cultures throughout history have shared. Material needs like food, shelter, and defense; and non-material needs like love, art, beauty, and a belief system were all examples of this idea. As the students toured the ruins, we looked for evidence of human survival and to see if we could recognize these needs. We wondered if the one petroglyph of a snake was communication, art, or part of their belief system. We took note of the metates used for grinding corn and other plants. We learned the pueblo had no doors on the first two stories in order make the houses safe and better for defense. Figuring out a way to direct fire smoke out of the lower rooms sideways made us realize they had seriously advanced engineering skills!\nWe also walked in to the community room to imagine what a ceremony might have been like in such a live sounding room. We tried sampling the acoustics and were amazed at how far a whisper can carry in a well-designed space!\n\nRichard May then led the activity at the ball court. He taught the students about the importance of ball courts throughout villages all over the southwest and what a huge distance there is between Wupatki (the northernmost example of these ceremonial courts) and Chichen Itza (the southernmost). The students were amazed to learn that the quetzal feathers and seashells found at Wupatki were evidence that trade took place between the two separate groups. He also explained how even today, playing games with people from other cultures helps break language barriers and has the ability to create friends anywhere you go. After the short lesson, the students had the chance to play a ball and stick game similar to what children at Wupatki might have played 900 years ago.\n\nBefore leaving, we made a quick stop at the blowhole. A fascinating geological feature where an opening to an underground cave will either suck air in or blow air out, depending on the temperature differential between the cave and the outdoor air. Archeologists think this opening might have had supernatural and religious significance to the residents of this home site. One parent that came along for the outing was a Hopi native who grew up on the Hopi Mesa. Describing different ball games he played, he confirmed that the games he learned were definitely significant, and that his relatives taught the children that the blowhole was the opening to the world where Spider Woman lived. She is the creative force of the whole world, and must be respected and never offended. It was a glorious day and we were all very excited to learn some new things!\n\nThis Seeds of Stewardship outing made possible by grants from:\n\nThanks to Peace Surplus for donating a portion of the survival kits for all the 4th graders in Flagstaff!<|endoftext|>3.0.5 Adjunct Faculty\n\nAdjunct faculty are employed to teach less than a normal faculty load or to teach less than a full session on a semester by semester or summer term basis. The adjunct faculty contract contains no guarantee of continued employment.\n\n3.0.6 Classified Employees\n\nClassified employees are employees who occupy positions that are listed in the Commonwealth’s Compensation Plan, and who are covered by the Virginia Personnel Act as found in Chapter 10, Title 2.1 of the Code of Virginia, once they have completed the probationary period.\n\n3.0.7 Wage Employees\n\nWage employees are employees not covered by the Virginia Personnel Act (also referred to as hourly, P-14, or WE-14 employees) who are non-exempt for purpose of overtime compensation, and who are used to supplement the workforce during seasonal or temporary workloads, to provide interim replacements, or to perform short-term projects, or other jobs that do not require full-time classified employees. Wage employees are limited to working 1500 hours per agency per year.\n\n3.1 Academic Rank and Administrative Titles\n\n3.1.0 Academic Rank\n\nThe titles authorized for the four standard levels of faculty rank are Professor, Associate Professor, Assistant Professor, and Instructor. The qualifications for these are on the VCCS-29.\n\n3.1.1 Special Rank\n\na. Assistant Instructor may be used for individuals, appointed on a temporary or emergency basis for one year, meeting most of the minimum requirements for the instructor rank and who show evidence of being able to complete such requirements within one year. A one-year renewal may be requested by a college administrator for a person who is actively pursuing completion of the necessary requirements.\n\nb. Lecturer may be used when qualifications make it more appropriate than other titles. It may also be used for grant funded positions if VCCS-29 qualifications do not apply.\n\n3.1.2 Emeritus: The Emeritus/Emerita title is honorific and is intended to acknowledge outstanding service to the Virginia Community College System. It does not represent any entitlement to authority, rights, privileges or resources.\n\na. President Emeritus.\n\n1. Eligibility: Candidates for emeritus status must have provided ten or more years of outstanding, distinguished, and honorable service to the VCCS in positions of substantial leadership to include the role of president.<|endoftext|>**BIRD GIFTS**\nIntroduce “Will U B Mine?” pages 5–10, by pointing out that gift-giving is a big part of Valentine’s Day. Ask students:\n\n- What are some gifts that people give each other to say, “Be my valentine?”\n- Would those be good gifts for a male bird to give a female bird? What might make better gifts?\n\nInvite children to learn more about ‘good’ bird gifts by reading the article. Afterward, have the class describe some of these gifts. Then wrap up the lesson by asking:\n\n- How might gift-gifting help a female bird select a mate?\n\n**YEAR OF THE RAT**\nThe year 2020 is the “Year of the Rat.” Ask students if they know why. (For nearly 5000 years, the Chinese culture has organized time in a cycle of 12 years. Each of the 12 years is represented by an animal that embodies unique qualities. 2020 is the Year of the Rat.)\n\nExplain that people born in the Year of the Rat are believed to possess certain rat-like qualities. Ask students to guess what some of these qualities might be. List their suggestions on the board or chart paper.\n\nAfter students have read “Oh, Rats!” pages 18–23, ask them to use what they have just learned about rats to improve their list of rat qualities. Then ask a student to look up the traditional description of this Chinese zodiac animal and read it aloud. Compare the official description with the class’s list. How closely do they match?\n\n**ARCTIC EXPLORATIONS**\nAfter reading “Arctic Outpost, pages 12–17, help students enhance their comprehension of the article by completing the Fill in the Details student page.\n\nThen have students write their own Arctic adventures, using the following writing prompt:\n\n- If you could visit the North Pole this year, what is the first thing you would like to do there?\n\nEncourage children to illustrate their stories and enter the illustrations in Ranger Rick’s “On Top of the World!” contest. Thirty winners will have their artwork photographed at the North Pole! For contest details, see rangerrick.org/NorthPole.\n\n**DOLPHIN ADVENTURES**\nHave students read this month’s Ranger Rick Adventures called “Star Power,” pages 24–26. Then ask:\n\n- Where do the Irrawaddy dolphins in the adventure live?\n- Why are they in trouble?\n- How can people help the dolphins?\n\nInvite students to write a newspaper interview with an Irrawaddy river dolphin. Encourage them to use information from this month’s adventure story as well as from other sources. The interview questions listed in the Interview with a Dolphin student page can guide children through the process, or children can write their own questions for an Irrawaddy to answer.\n\n**LEAP IT UP!**\nThe year 2020 is a leap year—the perfect time to celebrate", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-education_and_jobs", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-education_and_jobs/part-00-00000.npy", "text": " cover current topics of research interest in electrical engineering. The course content may vary from semester to semester. Advanced Topics in Electrical Engineering: Advanced Topics in Communication Networks: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Communication Networks: Read Less [-]\n\nEL ENG 290P Advanced Topics in Electrical Engineering: Advanced Topics in Bioelectronics 1 - 3 Units\nTerms offered: Spring 2019, Spring 2018, Fall 2017\nThe 290 courses cover current topics of research interest in electrical engineering. The course content may vary from semester to semester. Advanced Topics in Electrical Engineering: Advanced Topics in Bioelectronics: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Bioelectronics: Read Less [-]\n\nEL ENG 290S Advanced Topics in Electrical Engineering: Advanced Topics in Communications and Information Theory 1 - 3 Units\nTerms offered: Fall 2018, Fall 2016, Fall 2009\nThe 290 courses cover current topics of research interest in electrical engineering. The course content may vary from semester to semester. Advanced Topics in Electrical Engineering: Advanced Topics in Communications and Information Theory: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Communications and Information Theory: Read Less [-]\nEL ENG 290T Advanced Topics in Electrical Engineering: Advanced Topics in Signal Processing 1 - 3 Units\nTerms offered: Fall 2018, Fall 2017, Fall 2016\nThe 290 courses cover current topics of research interest in electrical engineering. The course content may vary from semester to semester.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Signal Processing: Read More [+]\nRules & Requirements\nPrerequisites: Consent of instructor\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 1-3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Advanced Topics in Signal Processing: Read Less [-]\n\nEL ENG 290Y Advanced Topics in Electrical Engineering: Organic Materials in Electronics 3 Units\nTerms offered: Spring 2014, Spring 2013, Fall 2009\nOrganic materials are seeing increasing application in electronics applications. This course will provide an overview of the properties of the major classes of organic materials with relevance to electronics. Students will study the technology, physics, and chemistry of their use in the three most rapidly growing major applications--energy conversion/generation devices (fuel cells and photovoltaics), organic light-emitting diodes, and organic transistors.\nAdvanced Topics in Electrical Engineering: Organic Materials in Electronics: Read More [+]\nRules & Requirements\nPrerequisites: EL ENG 130; and undergraduate general chemistry\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Electrical Engineering: Organic Materials in Electronics: Read Less [-]\n\nEL ENG W290C Advanced Topics in Circuit Design 3 Units\nTerms offered: Prior to 2007\nSeminar-style course presenting an in-depth perspective on one specific domain of integrated circuit design. Most often, this will address an application space that has become particularly relevant in recent times. Examples are serial links, ultra low-power design, wireless transceiver design, etc.\nAdvanced Topics in Circuit Design: Read More [+]\nRules & Requirements\nPrerequisites: MAS-IC students only\nCredit Restrictions: Students will receive no credit for W290C after taking 290C.\nRepeat rules: Course may be repeated for credit without restriction.\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of web-based lecture per week\nSummer: 10 weeks - 4.5 hours of web-based lecture per week\nOnline: This is an online course.\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAdvanced Topics in Circuit Design: Read Less [-]\n\nEL ENG C291 Control and Optimization of Distributed Parameters Systems 3 Units\nTerms offered: Fall 2017, Spring 2016, Spring 2015, Spring 2014\nControl and Optimization of Distributed Parameters Systems: Read More [+]\nRules & Requirements\nPrerequisites: ENGIN 7 and MATH 54; or consent of instructor\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of lecture per week\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nAlso listed as: CIV ENG C291F/MEC ENG C236\nControl and Optimization of Distributed Parameters Systems: Read Less [-]\nEL ENG C291E Hybrid Systems and Intelligent Control 3 Units\nTerms offered: Spring 2021, Spring 2020, Spring 2018\nHybrid Systems and Intelligent Control: Read More [+]\n\nHours & Format\nFall and/or spring: 15 weeks - 3 hours of lecture per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Letter grade.\nFormerly known as: 291E\nAlso listed as: MEC ENG C290S\nHybrid Systems and Intelligent Control: Read Less [-]\n\nEL ENG 297 Field Studies in Electrical Engineering 12 Units\nTerms offered: Summer 2018 8 Week Session, Fall 2011, Fall 2010\nSupervised experience in off-campus companies relevant to specific aspects and applications of electrical engineering. Written report required at the end of the semester.\nField Studies in Electrical Engineering: Read More [+]\n\nRules & Requirements\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\nFall and/or spring: 15 weeks - 1-12 hours of independent study per week\nSummer: 8 weeks - 1-12 hours of independent study per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Offered for satisfactory/unsatisfactory grade only.\nField Studies in Electrical Engineering: Read Less [-]\n\nEL ENG 298 Group Studies, Seminars, or Group Research 1 - 4 Units\nTerms offered: Spring 2022, Spring 2021, Spring 2020\nAdvanced study in various subjects through special seminars on topics to be selected each year, informal group studies of special problems, group participation in comprehensive design problems, or group research on complete problems for analysis and experimentation.\nGroup Studies, Seminars, or Group Research: Read More [+]\n\nRules & Requirements\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\nFall and/or spring: 15 weeks - 0 hours of lecture per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: The grading option will be decided by the instructor when the class is offered.\nGroup Studies, Seminars, or Group Research: Read Less [-]\n\nEL ENG 299 Individual Research 1 - 12 Units\nTerms offered: Summer 2022 8 Week Session, Spring 2022, Fall 2021\nInvestigation of problems in electrical engineering.\nIndividual Research: Read More [+]\n\nRules & Requirements\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\nFall and/or spring: 15 weeks - 1-12 hours of independent study per week\nSummer:\n6 weeks - 2.5-30 hours of independent study per week\n8 weeks - 1.5-22.5 hours of independent study per week\n\nAdditional Details\nSubject/Course Level: Electrical Engineering/Graduate\nGrading: Offered for satisfactory/unsatisfactory grade only.\nIndividual Research: Read Less [-]\nEL ENG 375 Teaching Techniques for Electrical Engineering 2 Units\nTerms offered: Spring 2022, Fall 2021, Spring 2021\nDiscussion of effective teaching techniques. Use of educational objectives, alternative forms of instruction, and proven techniques to enhance student learning. This course is intended to orient new student instructors to more effectively teach courses offered by the Department of Electrical Engineering and Computer Sciences at UC Berkeley.\nTeaching Techniques for Electrical Engineering: Read More [+]\n\nRules & Requirements\n\nPrerequisites: Teaching assistant or graduate student\nRepeat rules: Course may be repeated for credit without restriction.\n\nHours & Format\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": "4060 is available at 74 HC4060 or 74 HCT4060 in the high-speed CMOS series. Clock frequency is 40...60 Hz (with load capacitance of 15 pF) depending on the manufacturer.\n\nSpeed and output current (fan-out)\nThe real advances compared with previous CMOS logic lies in the improvement of speed and fan-out which in high-speed CMOS are comparable to those in TTL. Figure 3 shows graphs of the typical gate propagation delay vs load capacitance for metal-gate CMOS, silicon-gate buffered CMOS, LSTTL and high-speed CMOS. It is clear that HCMOS is only slightly faster than LSTTL, but its smaller increase in gate-propagation delay at higher load capacitances makes for a larger increase in output current. Typical gate propagation delays in HCMOS gate are 6 ns at 10 pF, 10 ns at 50 pF, and 11.5 ns at 100 pF load capacitance.\n\nIt is also interesting to compare other logic versions of the TTL family, particularly the new 'advanced' ALS series which is two to three times faster than LSTTL. Table 1 gives a comparison of a number of typical circuits in the 74 series.\n\nThe buffered versions of the HCMOS family all have identical output stages. These are, as in CMOS, symmetrical and deliver a current of about 4 mA at both HIGH and LOW. The bus driver outputs can even supply 6 mA in both directions. Figure 4 gives a comparison between the output current levels of HCMOS and LSTTL. At LOW level output there is no difference between the output currents: both types provide 4 mA at 0.4 V. When the output is logic 1 and the supply voltage is 5 V, a HCMOS circuit delivers 4 mA at an output voltage of not less than 4.2 V while the LSTTL version provides only 0.4 mA at\nnot less than 2.7 V. A standard HCMOS output can, therefore, like that of 1 LSTTL, be connected to up to 10 LSTTL inputs. The fan-out with driver output is 15 LSTTL loads. In the case of HCMOS loads, the input currents (typically 1 µA) have practically no effect, so that the fan-out is limited only by the input capacitance (typically 5 pF) and not by the drive power. One output can be connected to up to 20 HCMOS inputs without any noticeable deterioration. If speed and signal-to-noise are not important, it is possible to connect up to 4000 inputs to one output. Only then, at least in theory, is an output current of 4 mA reached.\n\nCurrent consumption, increase at higher switching frequencies\n\nLower current consumption not only reduces operating costs, but because of the reduction in heat, it also improves reliability. The quiescent current of HCMOS is, like that of CMOS, negligibly small, as, in contrast to TTL, the leakage current is of the order of only a few µA. During switching, however, internal and external capacitances have to be charged which means an increase in current. The higher the switching frequency, the higher the current consumption. In that respect, there is no difference between HCMOS and CMOS, but HCMOS circuits can switch much faster and therefore have a correspondingly higher power dissipation. The quiescent current in TTL circuits is already so high that additional current consumption becomes only noticeable at very high switching frequencies.\n\nFigure 5 shows the basic difference between HCMOS and LSTTL. If only one circuit is considered, as in the figure, the power dissipation of HCMOS and LSTTL reaches the same value at an operating frequency of only a few MHz. A practical system, however, consists of a much greater number of ICs which in turn contain several elements such as gates, flip-flops, and the like. LSTTL circuits use the same current whatever their operation; in HCMOS only those elements which actually switch consume power. For instance, in a counter with 10 flip-flops using LSTTL circuits, all flip-flops dissipate the same power, but if HCMOS circuits were used, each flip-flop would consume only half of what the preceding one does. This fact tips the balance firmly in favour of HCMOS, as is shown in figure 6. In a standard microcomputer system with a 2 MHz or 4 MHz CPU, HCMOS circuits would use only a fraction of the power LSTTL devices do. Even in a system with a 10 MHz microprocessor, the power dissipation in HCMOS circuits would be only about one eighth of that if LSTTL devices were used.\n\nSupply voltage, input level, and signal to-noise ratio\n\nThe supply voltage for the HC and HCU versions of the HCMOS family can vary between 2...6 V. The extension of the lower voltage limit to 2 V is particularly interesting in view of future generations of microprocessors and memories which will require a supply voltage of less than 5 V. Non-stabilized power supplies and batteries can be used without any problems, while one lithium cell or two nicad cells can serve as emergency supply.\n\nThe switching levels in HCMOS lie further apart than in LSTTL as can be seen clearly from figure 7. That means on the one hand a higher immunity to noise, but on the other that the inputs of HCMOS devices cannot be connected to the outputs of TTL circuits if the supply voltage is 5 V. ICs in the HC version can, however, be\n\nFigure 5. HCMOS shows the same typical increase in power dissipation with switching speeds as CMOS. For a single gate the power cross-over frequency is about 5 MHz, while that for a single flip-flop lies above 10 MHz.\n\nFigure 6. In a more complex circuit comprising a chain of 10 flip-flops, the power dissipation of HCMOS is clearly well below that of LSTTL even at the highest operating frequency.\nFigure 8. The permitted supply voltage variation of ±10 per cent in the 74 HCT (TTL-compatible) series is twice that of the LSTTL. The 74 HC series can operate from supply voltages down to 2 V.\n\nFigure 9. This shows the real improvement in input protection against electrostatic discharges in HCMOS as compared with CMOS.\n\nFigure 7. This shows that the noise immunity of HCMOS is far superior to that of LSTTL.\n\ncombined with LSTTL types if the supply voltage is 3 V. None the less, HCT types are TTL compatible if the supply voltage is 5 V. Input levels and immunity to noise are similar to LSTTL. In contrast to the 74 LS version, the 74 HCT tolerates a supply voltage variation of ±10 per cent (see figure 8).\n\nCompared with the already hard-wearing CMOS circuits of the 4000 family, the inputs of the HCMOS inputs are even better protected against electrostatic discharges. The input protection circuit shown in figure 9 contains a poly-silicon resistor which limits the current through the protection diode and also reduces the speed with which the current rises. The diodes themselves are also more robust than those used in CMOS ICs.\n\nManufacturers\n\nHCMOS are produced by a whole series of manufacturers and, for this article, data and other information of the following were used: Philips/Valvo, RCA, National Semiconductor, Motorola, and Fairchild. The ICs produced by these manufacturers in the 74HC, 74HCT, and 74HCU series are identical in all important parameters. Agreement exists between National Semiconductor and Motorola on the one hand and Philips/Valvo and RCA on the other as to common development of HCMOS and exchange of masks. Small differences do exist in the stated values of propagation delay and maximum clock frequency. Whereas there is conformity as to gate-propagation delays with typical values of 8 to 9 ns at 15 pF loads, flip-flops and counters produced by RCA and Philips are slightly faster than those of the other manufacturers. For instance, the maximum clock frequency of the 74HC74 is typically 60 Hz (RCA) or 40 Hz (National Semiconductor) at 15 pF load. Guaranteed minimum values could not be compared owing to lack of relevant information. Table 2 shows small differences in the type coding: each manufacturer has his own prefix.\n\nMore important differences exist in the packaging: only Philips/Valvo and RCA have so far planned to manufacture their\nTable 1\n\n
\n\n
\n
Gates
\n
HCMOS
\n
LT- TTL
\n
ALST- TTL
\n
S-TTL
\n
unit
\n
\n\n\n
\n
74XX00
\n
propagation delay
\n
8
\n
8
\n
5
\n
4
\n
\n
\n
74XX04
\n
propagation delay
\n
8
\n
8
\n
4
\n
3
\n
\n
\n
Multiplexer/decoder
\n
\n
\n
\n
\n
", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": "13. A reference voltage is also applied to a second input of comparator 13. When the level of the output signal from peak detector 12 exceeds the reference voltage, comparator 13 will generate a signal indicating the presence of ringing, which in turn indicates that load 30 is an inductive load.\n\nFIG. 8 shows the output waveform from filter 11 shown in FIG. 7, which is a high pass filter to reject line voltage frequency component, thus only the ringing waveform component of amplitude Vpk appears at the input to the peak detector 12.\n\nThe peak detector has an effective response time equal to several cycles of line voltage period, therefore the peak output voltage is achieved only after a corresponding number of consecutive ringing waveform events have occurred.\n\nWhen the magnitude of the peak detector output exceeds the associated reference voltage, the following comparator activates a latch circuit to change the dimmer operation to leading edge mode. FIG. 8 shows the waveform of the output of the peak detector rising to a value of Vpk. FIG. 8 also shows the value of Vref in dotted lines for reference.\nWhen the dimmer operation changes to leading edge mode the peak detector output slowly falls to zero, due to relatively slow decay time constant.\n\nIt will be understood that when this arrangement is used in a universal dimming circuit, this output may be used to trigger a known mode control circuitry to change the mode of operation of the universal dimming circuit from trailing edge to leading edge as described above.\n\nFIG. 9 shows FIG. 4 with an additional spike detector 40. Spike detector 40 may be used in conjunction with ringing detector 10 to further enhance the performance of the arrangement of the present invention.\n\nThe circuit and the operation of the preferred embodiment of the present invention will now be described in detail with reference to FIG. 10.\n\nThe circuit of the present invention can be divided into several functional blocks as follows:\n\nPower Transistor Drive Circuit\n\nThe load conducting elements in a typical reverse phase control dimmer comprise a pair of transistors such as MOSFET devices. Suitable gate input drive circuitry is required to provide control of switching transition time, as a means of limiting EMI (Electromagnetic Interference) emission levels (strict Standards apply in the industry to limit the level of EMI coming from devices such as dimmers).\n\nTransistors Q9 & Q10 as seen in FIG. 5 connect in series back-to-back fashion to form an ac switch for control of the connected load. In this embodiment, transistors Q9 and Q10 are MOSFETs (Metal-Oxide Semiconductor Field Effect Transistors), often used in power control applications. Resistors R23 & R24 assist in preventing parasitic oscillation that can occur with parallel connected MOSFETs.\n\nApplication of drive voltage to transistor R16 results in conduction of transistor Q6, which simultaneously causes transistor Q8 to be cutoff and transistor Q7 to also conduct and therefore result in activation of the load controlling ac switch.\n\nThe values of resistors R18, R19 & R20 are selected to ensure that Q7 conduction status follows that of Q6, while Q8 assumes the opposite conduction status. Q7 provides a level shifting function, while Q8 provides an inversion function.\n\nResistor R21 limits turn-on current via Q7 to ac switch gate input, necessary to achieve controlled leading edge switching transition times, particularly when the dimmer operation is in the forward phase or leading edge control mode.\n\nResistor R22 limits turn-off current via Q8 from ac switch gate input, necessary to achieve controlled trailing edge switching transition times, particularly when dimmer operation is in reverse phase control mode.\n\nLevel shifting transistor Q5, with bias resistors R13, R14 & R15 and blocking diode D6, is arranged to have conduction status opposite to that of Q6. This transistor provides an inverted pull-up drive for momentary enabling of the ringing detector circuit, which is described in more detail below.\n\nRinging Detector Circuit\n\nCapacitor C1 determines, in part, the ringing signal amplitude and frequency at each mains half-cycle dimmer turn-off transition. Diodes D1 & D2, in conjunction with intrinsic inverse diodes associated with Q9 & Q10, form a diode bridge to provide full-wave rectification of dimmer voltage waveform. At each mains half-cycle turn-off transition an initially rising voltage, followed by a ringing voltage component, centered around the instantaneous mains voltage, appears at the dc side of the bridge.\n\nAt the rising dimmer voltage transition, input coupling capacitor C3 becomes charged, via series components resistor R9, diode D4 & 15V dc rail, to a level equal to the peak ringing voltage.\n\nDuring the first ringing cycle, where the voltage is then falling, diode D4 becomes reverse biased while D5 is forward biased. This allows partial charge storage transfer from C3, via transistors R9, R26 & diode D5, into detector output capacitor C4—which consequently develops a negative voltage with respect to the 15V rail.\n\nThe charge delivered to detector output capacitor C4 accumulates with each mains half-cycle ringing event, with corresponding increase in capacitor voltage.\n\nFilter input resistor R26 provides a high frequency \"noise\" rejection function. Resistor R27 represents loading on the dc side of the diode bridge circuit, necessary to ensure the bridge output voltage can fall at a similar rate to that of the dimmer terminal voltage. Such loading elements can be provided by current source elements for 15V rail.\n\nDetector discharge resistor R10 has sufficient value that the rate of discharge of detector output capacitor C4 is relatively slow compared to the charging pulse repetition rate.\n\nDiode D5 prevents discharge of detector output capacitor C4 during the rising dimmer voltage transitions. This is necessary for the \"detection\" function.\n\nResistor R25 in conjunction with input coupling capacitor C3, provides a high-pass-filter function to prevent the relatively slow falling rate of change of mains instantaneous voltage from contributing to the detector output voltage. This provides the function of block 11 in FIG. 7.\n\nThe comparator circuit 13 (see FIG. 7) comprises bias current resistor R8, reference zener diode /2 and transistor Q3. The emitter terminal of Q3 forms the comparator input, while the collector terminal forms the output.\n\nThe latch circuit 20 comprises transistors Q1 & Q2 and bias current resistors R4, R5, R6 & R7. The base terminal of Q1 forms the latch input which is driven from the comparator 13 output, while the collector terminal forms the output.\n\nDetector disable transistor Q4, is normally biased into conduction through base current supply resistor R11. Under such conditions the charge source for detector output capacitor C4 is shunted thus disabling the ringing detector. Transistor Q5, in conjunction with capacitor C5 and resistor R11 is used to momentarily remove bias supply to Q4 at each mains half-cycle turn-off transition, thus enabling the ringing detector. This is done to minimize the susceptibility of the detector to surrounding electrical noise as previously described.\n\nQ5 is biased by resistors R13, R14 & R15 when Q7 is not in the conducting state. In the Q7 conduction state diode D6 acts to remove base current supply for Q5.\n\nOver-Voltage Detection Circuit\n\nAs described above, an additional function which may be implemented to enhance the function of the circuit is the use of an over-voltage, or voltage spike, detection circuit.\nDimmer operation in reverse phase control mode, when connected to highly inductive loads such as iron core transformer based neon lighting, will result in excessive voltage spiking across dimmer terminals at each mains half-cycle dimmer turn-off transition.\n\nTurning off the switch while there is any appreciable level of current causes a sudden rise in the voltage appearing across the load. As described by the well known relationship\n\n\\[ V = L \\frac{dI}{dt} \\]\n\nWhere \\( V \\) is the voltage appearing across the inductive load;\n\n\\[ L \\] is the magnitude of the inductance of the load; and\n\n\\[ \\frac{dI}{dt} \\] is the rate of change of the current \\( I \\) through the load over time \\( t \\)\n\nas will be understood by the person skilled in the art.\n\nAs can be seen, the greater the rate of change in current \\( I \\) through the load, the greater the voltage spike occurring. It follows then that the greater current at the time of turning off the switch, which causes the current to fall to zero in a very short space of time, the greater the rate of change of current and therefore the greater the voltage spike induced.\n\nThe over-voltage detection circuit arrangement functions firstly to safely limit spiking voltage amplitude, then activate a latch circuit after spiking has been detected for a number of successive mains voltage half-cycles (for example, 3-6 half cycles).\n\nOnce triggered, the latch output status is used to signal to the dimmer control circuit mechanism that dimming operation should be changed to forward phase, or leading edge, control mode.\n\nWith reference again to FIG. 10, diodes D1 & D2, in conjunction with intrinsic inverse diodes associated with Q9 & Q10, form a diode bridge to provide full-wave rectification of dimmer voltage waveform as described above in relation to the ringing detector. The series circuit of varistor MV1 and zener diode Z1 provide the necessary dimmer terminal voltage spiking clamping function.\n\nDuring clipping events, a voltage is developed across resistor R1 and detector output capacitor C2 is able to be charged via resistor R2 and diode D3. Blocking diode D3", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": "
(714) 996-6700
\n
\n
\n
Colorado
\n
Georgia
\n
Illinois
\n
\n
\n
24 Inverness Place, East
\n
2000 South Park Place
\n
5201 Tollview Drive
\n
\n
\n
Englewood, NJ 06112
\n
Atlanta, GA 30339
\n
Rolling Meadows, IL 60008
\n
\n
\n
(303) 649-5000
\n
(404) 955-1500
\n
(708) 255-8800
\n
\n
\n
New Jersey
\n
Texas
\n
\n
\n
\n
Hewlett-Packard Co.
\n
Hewlett-Packard Co.
\n
\n
\n
\n
150 Green Pond Road
\n
930 E. Campbell Rd.
\n
\n
\n
\n
Rockaway, NJ 07666
\n
Richardson, TX 75081
\n
\n
\n
\n
(201)627-6400
\n
(214) 231-6101
\n
\n
\n\n
\n\n#### EUROPEAN FIELD OPERATIONS\n\n
\n\n
\n
Headquarters
\n
France
\n
Germany
\n
\n\n\n
\n
Hewlett-Packard S.A.
\n
Hewlett-Packard France
\n
Hewlett-Packard GmbH
\n
\n
\n
150, Route du Nant-d’Avril
\n
1 Avenue Du Canada
\n
Hewlett-Packard Strasse
\n
\n
\n
1217 Meyrin 2/Geneva Switzerland
\n
Zone D’Activite De Courtaboef
\n
6380 Bad Homburg v.d. II
\n
\n
\n
Switzerland
\n
F-91047 Les Ulis Cedex
\n
Germany
\n
\n
\n
(41 22) 780.8111
\n
France
\n
(49 6172) 16-0
\n
\n\n
\n\n#### INTERCON FIELD OPERATIONS\n\n
\n\n
\n
Headquarters
\n
Australia
\n
Canada
\n
\n\n\n
\n
Hewlett-Packard Company
\n
Hewlett-Packard Australia Ltd.
\n
Hewlett- Packard (Canada) Ltd.
\n
\n
\n
5495 Deer Creek Rd.
\n
31-41 Joseph Street
\n
17500 South Service Road
\n
\n
\n
Palo Alto, California 94304-1316
\n
Blackburn, Victoria 3130
\n
Trans- Canada Highway
\n
\n
\n
(415) 857-6027
\n
(61 3) 995-2895
\n
Kirkland, Quebec H9J 2X8
\n
\n\n
\n\n#### China\n\nChina Hewlett-Packard Co.\n38 Bei San Huan X1 Road\nShuang Yu Shu\nHai Dian District\nBeijing, China\n(86 1) 256-6888\n\n#### Taiwan\n\nHewlett-Packard Taiwan\n8th Floor, H-P Building\n337 Fu Hising North Road\nTaipei, Taiwan\n(886 2) 712-0404\n\n---\n\n2-24 Quick Start:\nLearning How to\nMake Measurements\nIndex\n\nA\nanalystor configuration, 1-8-19\nanalyzers with option ID5, 1-10\nattaching cabinet flanges, 1-18\nattaching cabinet flanges and handles, 1-19\nattaching handles, 1-17\nS-parameter test set, 1-9\nT/R test set, 1-10\nwith cabinet flange kits, 1-16\nwith plotters, 1-11\nwith printers, 1-11\n\nC\ncertification, iii\nclock, setting, 1-15\ncontents of shipment, 1-2-3\naccessories included, 1-2\nadapters included, 1-2\ncables included, 1-2\ndocumentation included, 1-2\ncorrection constants, 1-26\n\nD\ndefinitions, 2-12\nreturn loss (dB), 2-12\nreturn loss (T), 2-12\nstanding-wave-ratio (SWR), 2-12\n\nE\nEEPROM backup disk, 1-26\nelectrical requirements, 1-6-7\nenvironmental requirements, 1-6-7\n\nF\nfront- and rear-panel features, 1-4-5\nfront panel, 1-4\nfront-panel features, 2-2\nchannel keys, 2-2\ndisplay, 2-2\ninstrument state keys, 2-3\nnumeric keypad, 2-3\nPRESET key, 2-3\nresponse softkeys, 2-2\nsoftkeys, 2-2\nstimulus softkeys, 2-3\n\nI\ninstallation, 1-1\n\nM\nmaking measurements, 2-1-20\nmanual conventions, v\nmeasurement procedure, 2-4\nmeasurement sequence\nchoosing measurement parameters, 2-4\nmaking a measurement calibration, 2-4\nmeasuring a device, 2-4\noutputting measurement results, 2-4\n\nO\noperation, 1-20-25\nchecking reflection mode, 1-25\nchecking transmission mode, 1-24\ninstalled options, 1-21\noperator's check, 1-23\nself-test, 1-22\n\nP\nplotter configuration, 1-11-14\npolar format, 2-18\nprinter configuration, 1-11-14\nproblems, data entry, 2-22\ncontrols do not respond, 2-22\nparameters not accepted, 2-22\nproblems, power-up, 2-21-22\ndisplay does not light, 2-21\ndisplay lights, but fan does not start, 2-21\nproblems, RF output, 2-22\nno RF signal at either PORT 1 or PORT 2, 2-22\n\nR\nrear panel, 1-5\nreflection measurements, 2-12-20\nadmittance, 2-20\nchoosing the measurement parameters, 2-13\nimpedance, 2-19\nmaking a measurement calibration, 2-13\nmeasuring a device, 2-14\nmeasuring return loss, 2-15\n\nIndex-1\noutputting measurement results, 2-15\nreflection coefficient, 2-16\n$S_{11}$ and $S_{22}$ in polar format, 2-18\nstanding wave ratio, 2-17\nregulatory information, iii\n\nS\nsafety considerations, general, iv\nsafety notes, iv\nsmith chart, 2-19\nstatic-safe workstation, 1-7\n\nT\ntransmission measurements, 2-5–11\n3 dB bandwidth, 2-8\n\nchoosing the measurement parameters, 2-5\nmaking a measurement calibration, 2-5\nmeasuring insertion loss with marker functions, 2-8\nmeasuring the device, 2-7\nout-of-band rejection, 2-9\noutputting the measurement results, 2-7\npassband flatness, 2-10\npassband ripple, 2-10\ntroubleshooting, 2-21–23\n\nW\nwarranty, iii<|endoftext|>Contents\n\n1 Revision History ........................................................................................................................................... 1\n 1.1 Revision 1.0 ......................................................................................................................................... 1\n2 Product Overview ......................................................................................................................................... 2\n3 Features and Properties ............................................................................................................................ 3\n4 Optical Appearance .................................................................................................................................... 4\n5 Storage ..................................................................................................................................................... 5\n6 Operation .................................................................................................................................................. 6\n7 Power Module Replacement ..................................................................................................................... 8\n8 Evaluating Thermal Properties of a Given Design .................................................................................... 9\n9", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " compatibility with the standard linear bipolar process. Control signals and data inputs are transistor-transistor logic (TTL) or 5-V complementary metal oxide semiconductor (CMOS) compatible, and timing is suitable for interface to most processors. The latch is level triggered; any activity on the data inputs during the enable period will cause the analog output to change. This allows the user of a single-chip microcomputer to tie the enable inputs low and sit the DAC directly on one of the latched ports already available. While several DAS, including onchip latches, are available, many of the latches are too slow to keep up with faster processors. Many also require bus data to remain stable for some time after strobing the latch, a condition which complicates the interface to 6800 type machines. The latch shown in Fig 1, however, operates in 100 ns, and has no data hold time requirement. In that it requires no negative power supply, the DACPORT is distinct from other \"microprocessor compatible\" DAS. It offers buffered analog output voltage ranges of 0 to 2.56 V and 0 to 10.0 V, pin selectable. The 2.56 V range is available when operating on a 4.5 V or higher power supply; the 10.0 V range can be used if the power supply is 11.4 V or higher.\n\nThe bus interface latch is straightforward; the active-low decoded address is applied to CS and the system WR connects to chip enable (CE). This connection will work in any system in which a valid address bus and a valid WR indicate valid data. When both CS and WR are low, data enter the latch; when either returns high, data are held (see Fig 2). In systems where data are valid only on clock edges, a simple one-shot will provide a usable control signal.\n\n**ADC-Microprocessor Interface Examples**\n\nThe AD574 12-bit converter is an example of an analog to digital device. Built with standard bipolar processing, it uses IIL to implement the control and successive approximation register (SAR) functions. Microprocessor handshake capability is included in the 28-pin double-width package; an improvement over the usual 32-pin, triple-width package used for 12-bit ADCs. The device can accommodate analog\ninput ranges of 0 to 10 or 20 V and ±5 or ±10 V, with full-scale accuracy determined by an onboard 10 V reference.\n\nA problem arises when 12 bits of data must be loaded into an 8-bit wide bus. Specifically, the data must be placed in two locations and accessed one piece at a time. Two possible formats can be used: left-justified, where the data indicate a fraction of the full-scale range, and right-justified, where the data represent an integral number of least significant bits (LSBs). The left-justified format also permits \"coarse reads\" of data in systems where an 8-bit word may momentarily provide sufficient resolution. Arithmetic is not hindered by left-justified data as long as the programmer recognizes that the data represent a binary fraction.\n\nInterfacing an ADC to a microprocessor requires a slightly different control sequence than interfacing a DAC to a microprocessor. First, the processor must tell the converter when to begin converting. Usually a WRITE address is decoded to provide the START pulse and one or more READ operations are needed to place the converted data on the bus. Also, since few integrated circuit ADGs (certainly none over eight bits) can convert during a single instruction, a STATUS output is required to indicate whether the converter has completed its cycle. This signal can be read and tested by the microprocessor or used as an interrupt in the case of a very slow converter (millisecond or longer conversion times). Alternately, the program can execute sufficient dummy instructions to timeout the converter's maximum conversion time. Fig 3 shows such a handshaking arrangement.\n\nThe AD7581 is a CMOS device which includes an 8-channel, 8-bit continuous-cycling ADC and 8 bytes of random access memory (RAM), both controlled by a built-in direct memory access controller. The processor thus sees only eight...\nmemory locations with up-to-date results from each of the eight internal ADC channels. The block diagram of the device (Fig 5) shows the high level of digital and analog integration on the chip.\n\nOf the successive approximation type, the ADC completes a scan of all eight channels in 500 $\\mu$s. As a channel is converted, the 8-bit result is deposited in the onchip RAM. Internal logic prevents the update from occurring during memory READ cycles. A single clock signal, which can be the system clock in 6800 or 6502 type processors, is required; address latch enable (ALE), while not necessarily symmetrical, can be used in 8085 type systems. In systems such as the 8085, which use a single bus to carry data and the least significant address bits, the onboard address latch can be used and is driven by ALE. If the address latch is not needed, ALE can be tied high, thus rendered transparent. Access time of the CMOS RAM is 250 ns. Total device power requirement is 40 mW for a 5-V supply.\n\nConversion is totally independent of central processing unit operations. It is continuous, with a status line providing a short negative-going pulse to signify a channel update. This pulse is extended when the last channel is converted, so that systems can detect when an 8-channel scan is completed.\n\nSummary\n\nMicroprocessor compatibility with conversion devices is presently obtained by three methods. In the first, no interface is added, and the user is required to custom-build his own. The compromise method allows some user flexibility, but vital functions are onchip. With the processor transparent method, conversion, handshaking, and storage are all integrated on a single chip.\nSingle-Chip Digital Correlator\nCompares Stored 64-Bit Reference Word\n\nA single-chip correlator that replaces 40 to 50 SS/MSI devices compares a stored 64-bit reference word with an incoming 64-bit serial word at a rate of 20 MHz. The total number of bit for bit agreements between the reference and incoming data are indicated by a 7-bit, binary weighted output. TDC1023, introduced by TRW LSI Products, 2525 E El Segundo Blvd, El Segundo, CA 90245, meets requirements of digital signal processing systems where signal patterns are compared. Correlation is widely used to detect a desired signal in the presence of other signals or noise, to identify specific signal patterns, and to measure time delays through various mediums.\n\nOperation of the device is centered around four 64-bit, independently clocked 40-MHz shift registers. Incoming data are clocked into the A register. The reference word is entered into the B register and then parallel dumped in the R register, allowing the user to serially load a new reference word into the B register while correlation takes place between the A and R registers. An M, or mask register, permits the user to select bit positions where no comparison is desired.\n\nData in the A and R registers are continually compared bit for bit by exclusive OR gates, whose outputs are applied to a digital summer via AND gates. The output of the digital summer is a 7-bit word that represents the binary weighted sum of the bit positions in the A and R registers that are in agreement. The mask register allows the user to work words of less than 64-bits and to eliminate bit positions of no interest. This register is employed by inserting logical 0s in the no comparison bit positions. Masked bits are prevented from reaching the digital summer because the outputs of the M register are applied to AND gates that also contain outputs from the exclusive-OR gates.\n\nEither true or inverted binary outputs can be obtained from the correlator through use of the INV control line, which is applied to seven exclusive-OR gates that accept outputs from the digital summer. Outputs from gates are applied to 3-state output buffers controlled by a signal TRI. Logical 1 applied to TRI disables the buffered outputs by placing them in their high impedance state. When INV is a logical 1, the output lines are inverted and when INV is logical 0, they are true.\n\nA correlation threshold, indicated by flag T, can be established with the independently clocked, 7-bit T register. This is accomplished by first placing the output lines (D₀ to D₆) in their high impedance state through the use of TRI. Then these output lines can be used to insert the binary weighted threshold number into the T register.\n\nWhen the binary weighted number from the digital summer is equal to or greater than the threshold number stored in the T register, flag T becomes a logical 1, showing that the threshold conditions have been met.\n\nExpansion of correlation codes in multiples of 64 bits can be accommodated using the Aₒᵤₜ, Bₒᵤₜ, and Mₒᵤₜ lines available on each chip. These outputs are applied to the corresponding Aₒᵳ, Bₒᵳ, and Mₒᵳ lines of the succeeding chip. With this arrangement an external digital summer must be used to obtain the final sum, a function obtained by a binary adder. Also, an external IC equivalent of the threshold register must be used if that function is desired. The maximum number of correlators that can be used in cascade is limited by the loading and speed of the external circuits. The device is housed in a 24-pin DIP and operates from a single 5-V supply. Inputs and outputs are TTL compatible.\n\nCircle 441 on Inquiry Card\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " motors are unique in that they will still work when the two connections are reversed. They will just spin in the opposite direction when hooked up backward. To keep things simple, always think of the red wire as positive (+) and the black wire as negative (-).\n\n**MEET YOUR MOTOR CONTROLLER.**\n\nThe TB6612FNG Motor Driver may look complicated, but it’s easy to use. Three pins on the right (PWMA, A12 and A11) control the two pins on the left (A01 and A02). The same is true for channel B. Motors require more current, which is why the VIN voltage is needed.\n\nMost ICs have polarity and usually have a polarity marking in one of the corners. The motor driver is no exception. Be sure to insert the motor driver as indicated in the circuit diagrams. The motor driver pins are explained in the table on the next page.\n
\n\n
\n
PIN LABEL
\n
FUNCTION
\n
POWER/INPUT/OUTPUT
\n
NOTES
\n
\n\n\n
\n
VM
\n
Motor Voltage
\n
Power
\n
This is where you provide power for the motors (2.2V to 13.5V)
\n
\n
\n
VCC
\n
Logic Voltage
\n
Power
\n
This is the voltage to power the chip and talk to the microcontroller (2.7V to 5.5V)
\n
\n
\n
GND
\n
Ground
\n
Power
\n
Common Ground for both motor voltage and logic voltage (all GND pins are connected)
\n
\n
\n
STBY
\n
Standby
\n
Input
\n
Allows the H-bridges to work when high (has a pull-down resistor, so it must actively be pulled high)
\n
\n
\n
AIN1/BIN1
\n
Input 1 for channels A/B
\n
Input
\n
One of the two inputs that determine the direction
\n
\n
\n
AIN2/BIN2
\n
Input 2 for channels A/B
\n
Input
\n
One of the two inputs that determine the direction
\n
\n
\n
PWMA/PWMB
\n
PWM input for channels A/B
\n
Input
\n
PWM input that controls the speed
\n
\n
\n
A01/B01
\n
Output 1 for channels A/B
\n
Output
\n
One of the two outputs to connect the motor
\n
\n
\n
A02/B02
\n
Output 2 for channels A/B
\n
Output
\n
One of the two outputs to connect the motor
\n
\n\n
\nHOOKUP GUIDE\n\nREADY TO START HOOKING EVERYTHING UP? Check out the circuit diagram and hookup table below to see how everything is connected.\n\n**CONNECTION TYPES**\n\n- **REDBOARD CONNECTION**\n- **BREADBOARD CONNECTION**\n\n**JUMPER WIRES**\n\n- 5V to 5V\n- GND to GND (-)\n- VIN to A1\n- D8 to J7\n- D9 to J6\n- D10 to J5\n- D11 to J3\n- D12 to J2\n- D13 to J1\n- D7 to I27\n- 5V (+) to 5V (+)\n- GND (-) to GND (-)\n- A2 to 5V (+)\n- A3 to GND (-)\n- J4 to 5V (+)\n- I26 to GND (-)\n\n**MOTOR**\n\n- A4 (RED +)\n- A5 (BLACK -)\n\n**MOTOR DRIVER**\n\n- C1-C8 to G1-G8 (VM on C1, PWMA on G1)\n\n**SWITCH**\n\n- F25\n- F26\n- F27\nOpen the Arduino IDE\n\nConnect the RedBoard to a USB port on your computer.\n\nOpen the Sketch:\nFile > Examples > SIK_Guide_Code_V_4 > CIRCUIT_5A-MOTOR BASICS\n\nSelect UPLOAD to program the sketch on the RedBoard.\n\nWHAT YOU SHOULD SEE\nFlip the switch. The motor will spin at the speed set by the motor speed variable (default is 0). Open the Serial Monitor, type any number from 130 to 255 or -130 to -255, and then press Enter. Changes in speed will be hard to notice. Send 0 to stop the motor.\n\nPROGRAM OVERVIEW\n\n1. Check to see if a command has been sent through the Serial Monitor. If a command has been sent, then set the motor speed to the number that was sent over the Serial Monitor.\n\n2. Check to see if the switch is ON or OFF.\n A: If the switch is ON, drive the motor at the motor speed.\n B: If the switch is OFF, stop the motor.\n\nCODE TO NOTE\n\nPARSING INTEGERS:\nSerial.parseInt();\n\n.parseInt() receives integer numbers from the Serial Monitor. It returns the value of the number that it receives, so you can use it like a variable.\n\nSERIAL AVAILABLE:\nSerial.available();\n\nThis command checks how many bytes of data are being sent to the RedBoard. If it is greater than 0, then a message has been sent. It can be used in an if statement to run code only when a command has been received.\n**CODING CHALLENGES**\n\n**MAKE THE SWITCH CHANGE DIRECTIONS:** Change the code so that the position of the switch changes the direction of the motor instead of turning it on and off.\n\n**REPLACE THE SWITCH WITH A BUTTON:** Try wiring a button into the circuit instead of the sliding switch. Now the motor only turns on when you push the button.\n\n**REPLACE THE SWITCH WITH A SENSOR:** Try changing the code so that the motor is activated by another sensor, like the photoresistor.\n\n---\n\n**TROUBLESHOOTING**\n\n**Motor not spinning**\nCheck the wiring to the motor driver. There are a lot of connections, and it’s easy to mix one of them up with another. Double check the polarity of the motor driver. All the text should face the same direction as everything else.\n\n**Switch not working**\nMake sure that you are hooked up to the middle pin and one side pin on the switch, and not both side pins.\n\n**Still not working?**\nJumper wires unfortunately can go “bad” from getting bent too much. The copper wire inside can break, leaving an open connection in your circuit. If you are certain that your circuit is wired correctly and that your code is error-free and uploaded but you are still encountering issues, try replacing one or more of the jumper wires for the component that is not working.\n\n---\n\nYou’ve completed **Circuit 5A**!\nContinue to **Circuit 5B** to construct a remote-controlled robot.\nIn this circuit, you’ll control two motors and build your own remote-controlled roving robot! You will also learn how to read information from a serial command so that you can use the Serial Monitor to tell the robot in what direction to move and how far to move.\n\nNEW CONCEPTS\n\n**ASCII CHARACTERS:** ASCII is a standard for character encoding, formalized in the 1960s, that assigns numbers to characters. When typing on a computer keyboard, each character you type has a number associated with it. This is what allows computers to know whether you are typing a lowercase “a,” an uppercase “A” or a random character such as ampersand (&). In this experiment, you will be sending characters to the Serial Monitor to move your remote-controlled robot. When you send a character, the microcontroller is interpreting that as a specific number. ASCII tables available online ([http://sfe.io/ASCII](http://sfe.io/ASCII)) make it easier to know which character is represented by which number.\n\n**CONVERTING STRINGS TO INTEGERS:** String variables hold words like “dog” or “Robert Smith” that are made up of multiple characters. Arduino has a set of special built-in methods for string variables that you can call by putting a period after the variable name, as follows:\n\n```java\nstring_variable_name.toInt();\n```\n\nThe `.toInt()` method converts the string to a number, and there are a dozen other methods that can do things like tell you the length of a word or change all of the characters in a string to uppercase or lowercase.\n\n**ASSEMBLY**\n\nBefore you build this circuit, you’ll need to make a few modifications to the breadboard baseplate to make it more robot-like!\n\n1. Cut and attach two short pieces of Dual Lock tape to the very corners of the baseplate on the side located under the breadboard.\n2. **CUT TWO MORE STRIPS** that are 1.25 inches (3.175cm) long and ¾ inch (1.9cm) wide. Remove the adhesive backing, and attach the strips to the two motors. Be sure that your motors are mirror images of each other when you attach the Dual Lock.\n\n3. **PRESS THE MOTORS TO THE BASEPLATE**, connecting the two Dual Lock surfaces. Try to get the motors as straight as possible so your robot will drive straight.\n\n4", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " all connections to the Control and Drive boards at this time. Proceed to section 7 Initial Power Up and Test.\n6.2 Replacing MOVFR-0069N\n\n• Remove the Control Board and Drive shown in Figure 17 - MOVFR-0069N\n• Mount and secure the ECI MOVFR-LCD Control board and Drive board as shown in Figure 18 - ECI MOVFR-LCD Installed.\n• Connect communication cable (CAT5) between Control and Drive Boards.\n• Make all connections to the Drive and Control boards at this time and proceed to Section 7 Initial Power Up and Test.\n\nFigure 16- MOVFR-00069N Installation Kit\n\nFigure 17 - MOVFR-0069N\n\nFigure 18 - ECI MOVFR-LCD Installed\n7 Initial Power Up and Test\n\n7.1 Manual Operation\n\n- With the doors in the fully closed position and the AUTO/MAN switch in the MAN position, apply power to door operator\n - LCD Display should show\n \n | Edit parameters |\n |-----------------|\n | Load defaults |\n | Diagnostics 1 |\n | Diagnostics 2 |\n\n - Check that the POWER on the display board and PWR LED on the drive board are lit.\n - Check that the COM, and BRAKE LEDs on the drive board are lit.\n- Press Enter Button to select EDIT PARAMETERS\n- Press – button until INPUT VOLTAGE is highlighted.\n- Press ENTER button and set to proper input voltage using + button. Press ENTER then ESC buttons when complete.\n- Move cursor down to DIAGNOSTICS 1 and press ENTER\n - LCD should show\n \n | VBUS : 317V 0s |\n | SPEED : 0 |\n | TEMP : 29C/ 84F|\n | MOTOR : .0A |\n | CYCLE : xxxx |\n\n - NOTE that the VBUS and TEMPs are estimates\n- With the AUTO/MAN switch in MAN position set the CLOSE/OPEN switch to the OPEN position. (If motor moves in wrong direction, remove power from unit and swap 2 or the 3 motor leads.)\n - The SPEED and MOTOR readings should increase as the door moves.\n - Hold switch until door is fully open and the DOL LED lights.\n - When fully OPEN the SPEED and MOTOR reading should go to 0 even with the switch in OPEN position.\n8 Adjustments\n\nAt this time adjustments can be made through the parameter settings to produce smooth door operation and adjust OPEN and CLOSE torque settings. Refer to section 8.1 for speed profiles and CAM settings.\n\nNOTE - For HEAVY DOOR adjustments the elevator car must be at a “heavy door” floor. When moving a heavy door in MAN operation the HEAVY switch must be used with the CLOSE and OPEN switches.\n\n**NOTE:** IT IS IMPORTANT TO RETURN THE DISPLAY TO THE MAIN MENU WHEN ADJUSTMENTS ARE COMPLETE. FAILING TO DO SO WILL RESULT IN PARAMETERS REVERTING TO DEFAULT SETTINGS SHOULD POWER BE LOST.\n\n8.1 Speed Profiles\n\n8.1.1 Closing Speed Profile\n8.1.2 Closing CAM/Sensor Sequence\n\nFigure 20 - Close CAM/Sensor Sequence\n\n8.1.3 Open Speed Profile\n\nFigure 21 - Open Speed Profile\n\n8.1.4 Open CAM/Sensor Sequence\n\nFigure 22 - OPEN CAM/SENSOR Sequence\n8.2 CAM Settings\n\n8.2.1 Right Hand CAMs\n\n8.2.2 Left Hand CAMs\n\n9 AUTO Operation\n\n- Go to EDIT PARAMETERS and change the INPUT VOLTAGE parameter to the proper voltage for your system.\n- Switch the AUTO/MAN switch to AUTO position.\n- Door operator is now ready for normal operation.<|endoftext|>Note\n\nThe LED & button mentioned through this document is at the back of the accessory, above the power jack/cable\nFull Instructions\n\nRequirements\n\n- HK Garage App Link Play Store App Store\n- Garage Door Accessory, power cable, and adapter\n- Tilt sensor and battery\n\nHardware button input and LED indicators:\n\nThe LED & button mentioned throughout this document is at the back of the device, near the power jack/cable\n\n1. **Button:**\n a. To reset the device to factory settings: Press and hold the button for 10 seconds\n b. To remove current wifi information stored on the device: Press and hold the button for 3 seconds.\n\n2. **LED states meaning table:**\n\n
\n\n
\n
Color
\n
State
\n
Meaning
\n
\n\n\n
\n
Orange(Red)
\n
Blink rapidly every 200ms
\n
Ready to Add to an account if device is brand new or after board is factory reset
\n
\n
\n
\n
\n
Wifi configuration has changed on Home App (If device is already added to an account)
\n
\n
\n
Solid
\n
Blink slowly each 3 seconds
\n
Working normally
\n
\n
\n
Red
\n
Blink on/off each 500 ms
\n
Device can connect to the wireless network, but has not been added to an account.
\n
\n
\n
Red
\n
Blink on/off each 1 second
\n
Connecting to available network.
\n
\n
\n
\n
\n
Firmware update is in progress.
\n
\n\n
\nInstruction steps\n\n1. Hardware setup\n a. Plug garage accessory into an AC outlet\n b. If the LED blinks orange (red) rapidly, the accessory is ready to accept new wifi configuration. Please proceed to the next step.\n\n2. Account registration and setup\n a. Install & open HK Watchman Garage Door app from the App Store (iOS)\n b. On the login screen, choose Sign up to create a new account\n c. Choose your username, email, and password. Then press Sign up to complete.\n d. Activate the registration email in your Inbox, please also check Spam or Junk if there is no registration email\n e. Login with the registered email and password\n f. When logged in successfully, you will be redirected to the Home screen.\n g. Click on the menu icon on the top left of the Home Screen to open a side menu.\n h. Click on the Add Home button on this menu to add a new home. Name the home. Verify that the home appears under My Homes on the side menu\n i. You have completed the account setup. Please proceed to the next step\n\n3. Gateway accessory & app configuration\n a. In the Home screen above, after a home is created, tap on the “+” button on the toolbar or the Add Product button to go to the Add Product screen\n b. Select your device which will show up as “Watchman xxxx”\nc. You’ll have the option to add the garage device either by using the camera to capture the QR code sticker on the side of the device or enter the code below the QR code on the sticker.\nd. When the accessory is successfully added, there will be a dialog to notify you of the event and the app will bring you back to the Home Screen. The accessory will now be solid orange (red).\ne. The accessory now displays on the home screen but is not yet functional since we haven't paired a tilt sensor with it. To assign a remote to an accessory, select on the top right corner of the accessory.\nf. Scroll down and click on Pair sensor. A dialog will pop up.\ng. On the tilt sensor, press and hold the button (circled in red below) until the LED (circled in blue) blinks red. Then, press Done on the dialog.\n\n(figure 1)\nh. The app will notify you of the outcome of the pairing process.\ni. You can now go back and control the garage. To open, swipe up, to close, swipe down. Refer to the section below on the orientation of the tilt sensor and how to attach it to your garage door.\n\n**Instructions on Orientation of the tilt sensor**\n\nTo simulate the open/close state of the garage door without having one, turn the tilt sensor to the corresponding open/close position of your desire.\n\n**Close state:**\n\nThe arrow points up like in this image (figure 2)\nOpen state:\n\nThe arrow points in (to the house) horizontally\nThe side shows in figure 1 will face downwards (the ground)\nInstructions on attaching the Tilt Sensor to the garage door\n\nAttach the side without the buttons to the top panel of the garage door, with the arrow pointing up, such that when the garage door is fully open, the arrow will point into the house and the side with the buttons will face the ground.\n\nOptional: Virtual Keypad\n\nVirtual keypad is a web application which appears on the phone's browser when a user uses its camera to scan the Doorbell QR Code/NFC tag. The virtual keypad allows the scanner to control the garage door with an access-code shared by the owner of the garage door, meant for guests which don't have our app available. The access code can be configured to be used only 1-time, within a limited time period, etc. and can be revoked anytime by the owner. In addition, the virtual keypad can acts as a virtual doorbell to anonymously contact the homeowner via phone notification, message chat, or video call.\n\nA. How to setup Virtual Keypad Via Doorbell QR Code/NFC tag\n\n1. Install ReachMe app: [Apple", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " $n$ & **maximize** BW\n\n$$A_0 = A_{\\text{tot}} \\Rightarrow A_0 = A_{\\text{tot}}^{\\frac{1}{\\nu n}}$$\n\n$$W_{\\text{on}} = \\frac{W_n}{A_{\\text{tot}}} \\cdot \\sqrt{\\frac{1}{2^{\\nu n} - 1}}$$\n\napply $\\frac{dW_{\\text{on}}}{dn} = 0$\n\nAfter some algebra:\n\n$$n_{\\text{opt.}} = \\frac{\\ln 2}{\\ln \\left\\{1 + \\frac{\\ln 2}{2 \\ln A_{\\text{tot}}}\\right\\}}$$\n\nFor large $A_{\\text{tot}}$,\n\n$$\\ln \\left\\{1 + \\frac{\\ln 2}{2 \\ln A_{\\text{tot}}}\\right\\} \\approx \\frac{\\ln 2}{2 \\ln A_{\\text{tot}}}$$\n\n$$\\ln(1 + x) \\approx x \\text{ for } x \\ll 1$$\n\n$$\\Rightarrow n_{\\text{opt.}} \\approx 2 \\frac{\\ln A_{\\text{tot}}}{\\ln 2}$$\noptimum gain/Stage:\n\n\\[ A_{0,\\text{opt}} = (A_{\\text{tot}})^{\\frac{1}{\\gamma_{\\text{opt}}}} = \\exp \\left\\{ \\frac{1}{\\gamma_{\\text{opt}}} \\ln A_{\\text{tot}} \\right\\} \\]\n\n\\[ \\approx e^{\\frac{1}{2}} \\]\n\n\\[ A_{0,\\text{opt}} = \\sqrt{e} \\]\n\noptimum BW:\n\n\\[ \\omega_{n,\\text{opt}} = \\frac{W_n}{A_{\\text{tot}}^{\\frac{1}{\\gamma_{\\text{opt}}}}} \\sqrt{\\frac{1}{2} \\gamma_{\\text{opt}} - 1} \\]\n\n\\[ \\approx \\frac{W_n}{\\sqrt{e}} \\left[ \\exp \\left\\{ \\frac{1}{\\gamma_{\\text{opt}}} \\ln 2 \\right\\} - 1 \\right]^{\\frac{1}{2}} \\]\n\n\\[ \\omega_{n,\\text{opt}} \\approx W_n \\sqrt{\\frac{\\ln 2}{2e \\ln A_{\\text{tot}}}} \\]\n\n\\[ \\omega_{n,\\text{opt}} \\approx \\frac{0.357 W_n}{\\sqrt{\\ln A_{\\text{tot}}}} \\]\n\nIn other words,\n\n* \\( BW \\times \\sqrt{\\ln a} = \\text{constant} \\)\n\n* If \\( A_{\\text{tot}} \\to A_{\\text{tot}} \\times 100 \\), \\( BW \\to < BW \\times 2 \\)\n\n* Overall amp does not have constant \\( G \\times BW \\) product (obviously, be cause \\( G \\times BW \\) is constant only for single-pole systems)\n* Gain product for this cascaded amp\n\n\\[ G = A_{\\text{tot}} \\cdot W_0 \\]\n\n\\[ = A_{\\text{tot}} \\cdot \\frac{0.357W_0}{\\sqrt{\\ln(A_{\\text{tot}})}} \\Rightarrow \\text{increases without bound} \\]\n\n---\n\n**Gain-bandwidth-delay Tradeoff**\n\n* Delay is less important in systems with 1-way comm. (e.g. TV, optical fibre comm.)\n* Coupling between A & BW is weak for higher order cascaded systems\n* If delay can be arbitrary, what A or B can be achieved?\n\n---\n\n* Recall: \\( BW \\propto \\frac{1}{\\text{rise time}} \\)\n\n* Imagine an amp that stores energy in input step for a long time, then dumps it suddenly into an output \\( \\Rightarrow \\) very fast rise time \\( \\Rightarrow \\) high BW\n\n**Distributed Amplifier** (Travelling Wave Amp.)\n\n\n* inputs to transistors supplied by tapped delay line\n* output fed into another tapped delay line\n* assume input has a voltage step.\n → after a delay through each line, it appears at transistor inputs\n → each transistor generates current equal to \\( g_m \\times \\text{input step} \\)\n → currents of all transistors sum coherently in time, if delays of input & output line are matched\n\n* at each point of the tapped delay line,\n \\[ \\text{Zin} = \\frac{Z_0}{2} \\]\n \n* overall gain \\( Av = \\frac{n \\cdot g_m \\cdot Z_0}{2} \\) for \\( n \\) stages\n\n→ \\( Av \\propto n \\)\n→ \\( Av > 0 \\) if \\( g_m > 0 \\)\n→ BW does not factor directly into tradeoff\n→ assume that \\( C_{in} \\&\\ C_{out} \\) of transistors are absorbed into \\( RLCG \\) of TDL\n→ \\( C_{in} > C_{out} \\) ⇒ matching between TDLs is difficult \\( \\{ C_{gs} > C_{db} \\} \\)\n* Can be power-hungry\n* TDLs can be replaced by lumped LC equivalents (artificial T-lines)\n* Main advantage: You can achieve significant gain @ freq. close to \\( f_r \\)\n* High gain & low NF not possible\n* Area is large\n* \\( Z_0 \\)'s for G & D T-lines need not be the same\n* If T-lines are lossy, \\( A_v \\to 0 \\) as \\( N \\to \\infty \\)\n\n\\[ \\text{Vin in gate line decays exponentially} \\]\n\\[ \\Rightarrow A_v \\text{ increases linearly with } n \\]\n\\[ \\Rightarrow n_{opt.} \\text{ exists for a given set of TDL's and MOSFETS.} \\]\n\n**Artificial T-lines**\n* Has BW limitation because of lumped LC (ideal lossless TDL has no BW limitation)\n* \\( T_{delay} = \\sqrt{LC} \\text{ per LC-section} \\)\n* (Ideal TDL \\( T_{del.} = \\sqrt{LC} \\cdot z \\), \\( z=\\text{length} \\))\n\\[ Z_{in} = j \\omega L \\frac{1}{2} \\left[ 1 \\pm \\sqrt{1 - \\frac{4}{\\omega^2 LC}} \\right] \\]\n\n\\[ \\Rightarrow \\text{cutoff} = \\frac{2}{\\sqrt{LC}} \\quad \\text{cutoff frequency} \\]\n\n* Choose \\( LC \\) for\n \n \\[ \\Rightarrow \\text{min. loss & attenuation} \\]\n \n \\[ \\Rightarrow \\text{cutoff } > \\text{required BW} \\]\n \n \\[ \\Rightarrow \\text{desired } T_{\\text{delay}} \\]\n \n \\[ \\Rightarrow \\text{constant group delay (min. dispersion)} \\]\n\n* for a lossy line, constant G.D. \\( \\Rightarrow RC = CL \\)\n\n\\[ \\Rightarrow \\frac{1}{\\tau} = \\frac{C}{L} \\quad \\text{equal time constants} \\]<|endoftext|>Identifying ValueRAM Memory Modules\n\nThis reference guide is designed to help you identify our ValueRAM® memory modules by specification. While this is a representation of a majority of our generic modules, naming conventions may vary as necessary. The back page is a summary of the terms used to describe these industry-standard modules.\n\n### DDR3 for Desktops and Servers (PC3-8500, PC3-10666)\n\n
\n\n
\n
ValueRAM
\n
Module Code
\n
Type
\n
Chip Type
\n
Speed
\n
Capacity
\n
Special Designators
\n
\n\n\n
\n
KVR 1066
\n
D3 D 4 R 7 S K2/4G
\n
Registered
\n
Registered
\n
1333
\n
4GB
\n
Intel Validated
\n
\n\n
\n\n### DDR2 for Notebooks, Desktops, and Servers (PC2-3200, PC2-4200, PC2-5300, PC2-6400)\n\n
\n\n
\n
ValueRAM
\n
Module Code
\n
Type
\n
Chip Type
\n
Speed
\n
Capacity
\n
Special Designators
\n
\n\n\n
\n
KVR 400
\n
D2 D 8 N 3 H K2/512
\n
Registered
\n
Registered
\n
667
\n
4GB
\n
Intel Validated
\n
\n\n
\n\n### DDR for Servers (PC2700, PC3200)\n\n
\n\n
\n
ValueRAM
Description\n\nThe KP25x integrated pressure sensor family is a miniaturized Digital Barometric Air Pressure Sensor IC based on the capacitive principle. It is surface micro-machined with a monolithic integrated fully digital signal conditioning circuit, implemented in state-of-the-art 0.5 micron BiCMOS technology. The KP25x provides an SPI interface to enable direct microcontroller connections with a minimum bill of materials.\n\nThe KP25x is individually calibrated and temperature compensated, reducing software complexity by providing a direct readout of pressure and temperature. KP25x provides a fast startup time of less than 10 ms, high accuracy of up to 1 kPa and different sensitivities. Combined with the wide operating temperature range of -40 to 125 °C, high ESD robustness, and excellent EMC performance, the KP25x is perfectly suited to the harsh environmental conditions prevalent in automotive and industrial applications.\n\nFeatures\n\n- High accuracy pressure sensing up to +/- 1.0 kPa\n- Integrated temperature sensor\n- Pressure ranges 40-115 kPa and 60-165 kPa\n- Wide operating temperature range -40 to 125 °C\n- Digital SPI interface\n- Up to 12 bit pressure and temperature resolution\n- Calibrated and compensated\n- Self-diagnosis features\n- Fast startup time of less than 10 ms\n- „Green“ 8 pin SMD housing\n\nTypical Applications\n\n- Automotive Engine Management\n- Small Engine Management\n- Industrial Control\n- Altimeter\n- Weather Station\n- Medical\n\nKP25x Application Circuit\n\nwww.infineon.com/pressure\nKP25x Integrated Pressure Sensor\nDigital Barometric Air Pressure Sensor IC\n\nINFINEON TECHNOLOGIES offers an extensive product portfolio for gasoline and diesel engine management systems and industrial control applications. Our products range from micromachined sensors, microcontrollers, and smart power ICs to voltage regulators and other standard components. The KP25x is a digital integrated pressure sensor for barometric pressure management, and provides benchmark performance in terms of reliability, accuracy, and ease-of-use.\n\n
\n\n
\n
Parameter
\n
KP253
\n
KP254
\n
KP256
\n
Unit
\n
\n\n\n
\n
Pressure range
\n
60.0 - 165.0 kPa
\n
40.0 - 115.0 kPa
\n
60.0 - 165.0 kPa
\n
kPa
\n
\n
\n
Accuracy
\n
+/- 1.0 kPa
\n
+/- 1.5 kPa
\n
+/- 1.0 kPa
\n
kPa
\n
\n
\n
Output Format
\n
Digital SPI
\n
Digital SPI
\n
Digital SPI
\n
\n
\n
\n
Resolution
\n
12 bits
\n
10 bits
\n
10 bits
\n
bits
\n
\n
\n
Sensitivity
\n
39 LSB/kPa
\n
13.6 LSB/kPa
\n
9.8 LSB/kPa
\n
LSB/kPa
\n
\n
\n
Supply Voltage
\n
3.3 - 5.0 V
\n
3.3 - 5.0 V
\n
3.3 - 5.0 V
\n
V
\n
\n
\n
Order Code
\n
SP000843708
\n
SP000773948
\n
SP000773952
\n
\n
\n\n
\n\nATTENTION PLEASE!\nThe information given in this document shall in no event be regarded as a guarantee of conditions or characteristics (\"Beschaffenheitsgarantie\"). With respect to any examples or hints given herein, any typical values stated herein and/or any information regarding the application of the device, Infineon Technologies hereby disclaims any and all warranties and liabilities of any kind, including without limitation warranties of non-infringement of intellectual property rights of any third party.\n\nINFORMATION\nFor further information on technology, delivery terms and conditions and prices please contact your nearest Infineon Technologies Office (www.infineon.com).\n\nWARNINGS\nDue to technical requirements components may contain dangerous substances. For information on the types in question please contact your nearest Infineon Technologies Office. Infineon Technologies Components may only be used in life-support devices or systems with the express written approval of Infineon Technologies, if a failure of such components can reasonably be expected to cause the failure of that life-support device or system, or to affect the safety or effectiveness of that device or system. Life support devices or systems are intended to be implanted in the human body, or to support and/or maintain and sustain and/or protect human life. If they fail, it is reasonable to assume that the health of the user or other persons may be endangered.<|endoftext|>Summary\n\nThe Intel® Multi-Channel Streaming DMA Controller IP provides a small footprint, highly efficient solution for FPGA designs.\n\nThis IP Core offers both memory-based DMA for handling transfers to and from addressed memory such as on-board SRAM and SDRAM, and FIFO-based DMA for streaming applications.\n\nIntel's DMA Controller and reference design applications provide the complete solution for rapid inclusion of fast PCI Express data transfers and streaming into FPGA environments. Additionally, Intel's generic software API is platform-independent thus enabling auto-discovery of applications and helping provide a route to the unique PCI identification of the final product.\n\nKey Features\n\n- PCIe-based DMA Controller firmware\n- 64, 128 and 256-bit PCIe interface support:\n - PCIe Gen1, Gen2, Gen3 support (dependent on FPGA family)\n - 1 & 2, 4 or 8 PCIe lane support options\n- PCIe 8-lane Gen3 supports up to four UHDTV1 (3840 x 2160 p60 video streams.\n- Offers both streaming FIFO-based DMA and memory-based DMA channels\n- Highly efficient use of PCIe bandwidth, making it particularly suited to data streaming applications\n- Support for multiple outstanding read requests\n- Pre-fetching of Scatter-Gather descriptors for continuous streaming\n- Optimised arbiter for back-to-back packing of Transition Layer Packets (TLP)\n- Configurable number of 32, 64 or 128bit FIFO-based DMA streaming channels\n- Supports 32-bit or 64-bit addressing\n- Free 30-day evaluation\nApplications\n\nThe Intel Multi-Channel Streaming DMA Controller IP can be used in a range of applications including:\n\n- Video to PCI conversion\n- Video capture and storage\n- Video analysis\n\nThe associated application demonstrates the ability of the DMA controller to simultaneously read and write multiple input video streams. It can work with SD, HD or 3G video. The application also demonstrates the use of the Windows driver and API supplied with the DMA Controller.\n\nProduct Options\n\n- 1 & 2, 4 or 8 PCI Express Lane support\n- Streaming FIFO-based DMA support\n- Number of DMA channels (up to 16)\n- FPGA family\n- QT application providing register/write DMA functions, source code\n- Intel Generic API and Driver source code\n- Extended evaluation period (over 30 days)\n- Extended support period (over 1 year)\n\nDesign Your Product Today with Intel FPGAs\n\nIntel provides a large range of complementary and modular in-house IP cores for video processing and connectivity. These IP cores can be used to create complete solutions for applications in Broadcast, ProAV, Aerospace/Defense, Medical, Automotive and more.\n\nYou can get more information on available video IP at www.intel.com/fpga-broadcast or contact an Intel sales representative for further inquiries.<|endoftext|>KEYSTROKE TACTILITY ARRANGEMENT ON A SMOOTH TOUCH SURFACE\n\nInventor: Wayne Carl Westerman, San Francisco, CA", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": "46\n
146
\n
646
\n
146
\n
\n
\n
523.xalancbmk_r
\n
72
\n
314
\n
242
\n
314
\n
242
\n
315
\n
241
\n
\n
\n
525.x264_r
\n
72
\n
276
\n
456
\n
276
\n
457
\n
278
\n
453
\n
\n
\n
531.deepsjeng_r
\n
72
\n
435
\n
190
\n
433
\n
191
\n
433
\n
191
\n
\n
\n
541.leela_r
\n
72
\n
646
\n
184
\n
655
\n
182
\n
647
\n
184
\n
\n
\n
548.exchange2_r
\n
72
\n
402
\n
470
\n
400
\n
471
\n
401
\n
470
\n
\n
\n
557.xz_r
\n
72
\n
518
\n
150
\n
518
\n
150
\n
517
\n
151
\n
\n\n
\n\n*Results appear in the order in which they were run. Bold underlined text indicates a median measurement.*\n\nSubmit Notes\n\nThe numactl mechanism was used to bind copies to processors. The config file option 'submit' was used to generate numactl commands to bind each copy to a specific processor. For details, please see the config file.\n\nOperating System Notes\n\nStack size set to unlimited using \"ulimit -s unlimited\"\n\nGeneral Notes\n\nEnvironment variables set by runcpu before the start of the run:\nLD_LIBRARY_PATH = \"/home/cpu2017/lib/intel64:/home/cpu2017/lib/ia32:/home/cpu2017/je5.0.1-32\"\n\nBinaries compiled on a system with 1x Intel Core i9-7900X CPU + 32GB RAM memory using Redhat Enterprise Linux 7.5\nTransparent Huge Pages enabled by default\nPrior to runcpu invocation\nFilesystem page cache synced and cleared with:\nsync; echo 3>/proc/sys/vm/drop_caches\nruncpu command invoked through numactl i.e.:\nnumactl --interleave=all runcpu \nNA: The test sponsor attests, as of date of publication, that CVE-2017-5754 (Meltdown) is mitigated in the system as tested and documented.\nYes: The test sponsor attests, as of date of publication, that CVE-2017-5753 (Spectre variant 1) is mitigated in the system as tested and documented.\nYes: The test sponsor attests, as of date of publication, that CVE-2017-5715 (Spectre variant 2)\nCisco Systems\nCisco UCS B200 M5 (Intel Xeon Gold 6240M, 2.60GHz)\n\nSPECrater®2017_int_base = 227\nSPECrater®2017_int_peak = Not Run\n\nCPU2017 License: 9019\nTest Date: Aug-2019\nTest Sponsor: Cisco Systems\nHardware Availability: Apr-2019\nTested by: Cisco Systems\nSoftware Availability: May-2019\n\nGeneral Notes (Continued)\n\nis mitigated in the system as tested and documented.\n\nPlatform Notes\n\nBIOS Settings:\nIntel HyperThreading Technology set to Enabled\nSNC set to Enabled\nPower Performance Tuning set to OS Controls\nPatrol Scrub set to Disabled\nSysinfo program /home/cpu2017/bin/sysinfo\nRev: r5974 of 2018-05-19 9bcede8f2999c33d61f64985e45859ea9\nrunning on linux-db10 Wed Sep 4 15:10:41 2019\n\nSUT (System Under Test) info as seen by some common utilities.\nFor more information on this section, see\nhttps://www.spec.org/cpu2017/Docs/config.html#sysinfo\n\nFrom /proc/cpuinfo\n model name : Intel(R) Xeon(R) Gold 6240M CPU @ 2.60GHz\n 2 \"physical id\"s (chips)\n 72 \"processors\"\n cores, siblings (Caution: counting these is hw and system dependent. The following\n excerpts from /proc/cpuinfo might not be reliable. Use with caution.)\n cpu cores : 18\n siblings : 36\n physical 0: cores 0 1 2 3 4 8 9 10 11 16 17 18 19 20 24 25 26 27\n physical 1: cores 0 1 2 3 4 8 9 10 11 16 17 18 19 20 24 25 26 27\n\nFrom lscpu:\n Architecture: x86_64\n CPU op-mode(s): 32-bit, 64-bit\n Byte Order: Little Endian\n CPU(s): 72\n On-line CPU(s) list: 0-71\n Thread(s) per core: 2\n Core(s) per socket: 18\n Socket(s): 2\n NUMA node(s): 4\n Vendor ID: GenuineIntel\n CPU family: 6\n Model: 85\n Model name: Intel(R) Xeon(R) Gold 6240M CPU @ 2.60GHz\n Stepping: 7\n CPU MHz: 2600.000\n CPU max MHz: 3900.0000\n CPU min MHz: 1000.0000\n\n(Continued on next page)\nCisco Systems\nCisco UCS B200 M5 (Intel Xeon Gold 6240M, 2.60GHz)\n\nCPU2017 License: 9019\nTest Sponsor: Cisco Systems\nTested by: Cisco Systems\n\nSPECratenumber_int_base = 227\nSPECratenumber_int_peak = Not Run\n\nTest Date: Aug-2019\nHardware Availability: Apr-2019\nSoftware Availability: May-2019\n\nPlatform Notes (Continued)\n\nBogoMIPS: 5200.00\nVirtualization: VT-x\nL1d cache: 32K\nL1i cache: 32K\nL2 cache: 1024K\nL3 cache: 25344K\nNUMA node0 CPU(s): 0-2,5,6,9,10,14,15,36-38,41,42,45,46,50,51\nNUMA node1 CPU(s): 3,4,7,8,11-13,16,17,39,40,43,44,47-49,52,53\nNUMA node2 CPU(s): 18-20,23,24,27,28,32,33,34-35,57,58,61,62,65-67,70,71\nNUMA node3 CPU(s): 21,22,25,26,29-31,34,35,55,56,59,59,60,63,64,68,69\nFlags: fpu vme de pse tsc msr pae mce cmov pat pse36 c compiler_safe ds acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc cpuid aperfmperf tsc_known_freq pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 sse3", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part1/part-00-00000.npy", "text": " \\approx 35\\% \\cdot \\left(V_{out,setpoint} + \\frac{V_{AC,max(pk)} + V_{margin,FET}}{N}\\right)$,\n\n$$V_{r(diode),max} \\approx 135\\% \\cdot \\left(V_{out,setpoint} + \\frac{V_{AC,max(pk)} + V_{margin,FET}}{N}\\right) = 135\\% \\cdot \\left(54 + \\frac{\\sqrt{2} \\cdot 305 + 90}{3.2}\\right)$$\n\n$$V_{r(diode),max} \\approx 292.81 \\, V$$\n\n$$I_{sec(pk),max} \\approx I_{pri(pk),max} \\cdot \\frac{N_p}{N_z} = 2.606 \\cdot \\frac{32}{10}$$\n\n(12)\n\n$$I_{sec(pk),max} \\approx 8.34 \\, A$$\n\nBased on the above, a secondary main output diode with repetitive reverse voltage rating $V_{RRM} = 300 \\, V$ is selected. To minimize its switching and conduction losses, the selected diode also has the properties of hyper-fast recovery speed and low forward voltage drop at $I_{sec(pk),max}$.\n\nAdditionally, a RC secondary snubber network, e.g., 10 Ω resistor in series with 150 pF capacitor, is deployed across the secondary main output diode, to suppress the diode reverse voltage spike and the EMI.\n5 CS resistor and GD pin-related design\n\nFigure 5 shows the connections of the current sense (CS) resistor $R_{CS}$, gate resistor $R_G$ and gate source resistor $R_{GS}$.\n\n\n\nBased on the CS pin voltage across $R_{CS}$, the MOSFET current can be measured.\n\nThe recommended minimum CS resistor value $R_{CS,\\text{min}}$ is defined and calculated as:\n\n$$R_{CS,\\text{min}} = \\frac{0.45}{I_{pri(pk),\\text{max}}} = \\frac{0.45}{2.606} = 0.173 \\Omega$$ \\hspace{1cm} (13)\n\nThe recommended maximum CS resistor value $R_{CS,\\text{max}}$ is defined and calculated as:\n\n$$R_{CS,\\text{max}} = \\frac{0.54}{I_{pri(pk),\\text{max}}} = \\frac{0.54}{2.606} = 0.207 \\Omega$$ \\hspace{1cm} (14)\n\nBased on the calculation results above, CS resistor $R_{CS} = 0.2 \\Omega$ is selected in this design example.\n\n$R_G$ is to damp the gate-rise oscillation, and $R_{GS}$ is to ensure the MOSFET gate has relatively low impedance to prevent it from being switched on undesirably. $R_G = 10 \\Omega$ and $R_{GS} = 20 \\text{k}\\Omega$ are selected in this design example.\n\nThe gate-drive peak voltage $V_{GD,pk}$ is typically 12 V with sufficient $V_{CC}$ voltage supply. To achieve a good balance of switching loss and EMI, the gate voltage rising slope can be controlled by configuring the gate driver peak source current parameter $I_{GD,pk}$ (configurable range: 30 mA to 118 mA). This saves two components (see $D_{\\text{fastoff}}$, $R_{\\text{slowon}}$ in Figure 6), which are conventionally added for the same purpose.\n\n\n\nWith the high-speed switching characteristics of CoolMOS™ P7 MOSFET, it is recommended to configure the $I_{GD,pk}$ parameter in the range of 30 mA to 49 mA.\n\nAs a result, $I_{GD,pk} = 30 \\text{ mA}$ is selected in this design example.\n6 Input voltage parameters for operation, start-up and protection\n\nThe lowest operational input voltage parameter $V_{in,low}$ and the highest operational input voltage parameter $V_{in,high}$ can be defined and calculated as:\n\n$$V_{in,low} = a \\cdot V_{AC,\\text{min}}$$\n\n$$V_{in,high} = b \\cdot V_{AC,\\text{max}}$$\n\nWhere $a$ is recommended to be between 0.9 and 0.95, and $b$ is recommended to be between 1.05 and 1.10.\n\nTaking $a = 0.91$ and $b = 1.07$,\n\n$$V_{in,low} = 82 \\, V_{\\text{rms}}$$\n\n$$V_{in,high} = 326 \\, V_{\\text{rms}}$$\n\n$EN_{OVP,\\text{In}}$ parameter refers to the enable switch for maximum input voltage start-up check and input OVP, based on $V_{\\text{in,start,max}}$ and $V_{\\text{inOV}}$ levels, respectively. $EN_{OVP,\\text{In}} = \\text{Enabled}$ is selected in this design example.\n\n$EN_{UVP,\\text{In}}$ parameter refers to the enable switch for minimum input voltage start-up check and input UVP, based on $V_{\\text{in,start,min}}$ and $V_{\\text{inUV}}$ levels, respectively. $EN_{UVP,\\text{In}} = \\text{Enabled}$ is selected in this design example.\n\n$V_{\\text{in,start,max}}$ parameter refers to the maximum input voltage level setting for start-up, which is recommended to be configured as $V_{in,high}$. Hence, $V_{\\text{in,start,max}} = 326 \\, V_{\\text{rms}}$ is selected in this design example. $V_{\\text{inOV}}$ parameter refers to the input OVP level setting, which is recommended to be:\n\n$$V_{\\text{inOV}} \\geq V_{\\text{in,start,max}} \\cdot 107\\% = 349 \\, V_{\\text{rms}}$$\n\n(17)\n\n$V_{\\text{in,start,min}}$ parameter refers to the minimum input voltage level setting for start-up, which is recommended to be configured as $V_{in,low}$. Hence, $V_{\\text{in,start,min}} = 82 \\, V_{\\text{rms}}$ is selected in this design example. $V_{\\text{inUV}}$ parameter refers to the input UV (brown-out) protection level setting, which is recommended as:\n\n$$V_{\\text{inUV}} \\leq V_{\\text{in,start,min}} \\cdot 93\\% = 76 \\, V_{\\text{rms}}$$\n\n(18)\n\nBased on the above, $V_{\\text{inOV}} = 350 \\, V_{\\text{rms}}$ and $V_{\\text{inUV}} = 70 \\, V_{\\text{rms}}$ are selected in this design example.\n\nThe input voltage protections (based on $V_{\\text{inOV}}$ and $V_{\\text{inUV}}$) in ABM can be optionally enabled with $EN_{\\text{VIN,ABM}}$ parameter. If $EN_{\\text{VIN,ABM}}$ is enabled, the enable switches for $V_{\\text{inOV}}$ and $V_{\\text{inUV}}$ protections in ABM are respectively based on $EN_{OVP,\\text{In}}$ and $EN_{UVP,\\text{In}}$. In this design example, $EN_{\\text{VIN,ABM}} = \\text{Enabled}$ is selected. The input OVP blanking period number parameter $t_{\\text{inOV,blank}} = 1$ is recommended and selected in this design example.\n# HV pin-related design\n\nAs shown in Figure 8, HV series resistor \\( R_{HV} \\) is connected from the HV pin to the cathodes of HV diode \\( D_{HV1} \\) and \\( D_{HV2} \\), while bridge rectifier AC input should be applied across the \\( D_{HV1} \\) anode and \\( D_{HV2} \\) anode.\n\nA high voltage capacitor \\( C_{HV} \\) should also be connected between the HV pin and ground, to filter the switching noise for a robust HV pin line synchronization. In addition, \\( C_{HV} \\) also improves the input voltage surge and ESD capability of the HV pin.\n\nThe repetitive reverse voltage rating \\( V_{RRM} = 1000 \\text{ V} \\) for \\( D_{HV1} \\) and \\( D_{HV2} \\) is recommended and selected in this design example, to ensure good reliability of the diodes against input voltage surge.\n\n\n\n**", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ", CA 94022 (415) 948-6533.\n- SOUTHERN CALIFORNIA, ARIZONA: Crown Electronics, 1146 Collins Street, No. Hollywood, CA 91601 (213) 877-3550\n\nINFORMATION RETRIEVAL NUMBER 3\n\nElectronic Design 24, November 22, 1975\nNEWS\n23 News Scope\n29 Washington Report\n50 Instrument '75—a special issue featuring current trends in instrumentation. Topics covered include: microprocessors in instruments; computer and calculator-based instrumentation; the latest in LSI testers; what's new in function generators; instruments in the nonelectronics industry and new multifunction instruments. In addition, there are engineering management interviews with Bill Terry and Jack Lieberman of Hewlett-Packard and Henk Bodt of Philips Test & Measurement.\n\nTECHNOLOGY\n37 MICROPROCESSOR DESIGN\n112 Phase-meter specs can fool you, unless you consider the input signal before buying. First, know your application, then see how the meter responds.\n120 To test hybrid PC boards, with mixed analog and digital circuits, requires a versatile test system. The practical choice narrows down to four types.\n128 Test semiconductors automatically with a computer. With a precision interface, you can accurately force voltage or current and measure response.\n134 Avoid I^2D0 measurements and you will lighten your test load. But if you must measure this vague transistor parameter, here's how to do it faster.\n138 Take oddball pulses in stride. A new method, the pulse-width synthesizer, lets you accurately measure the widths of unpredictably shaped pulses.\n146 Ideas for Design:\nFET analog-switch circuit provides 63-dB on-off ratio. Capacitor drops voltage with little heat for low-cost, low-voltage power supply. Crystal control of a one-shot ensures accurate pulse-width output.\n\nPRODUCTS\n162 Modules & Subassemblies: Deglitching modules attenuate spikes on current-output d/a's by over 70 dB.\n171 Data Processing: Full APL computer delivers mainframe power in mini size.\n174 Data Processing: OEM mini line offers core or MOS memory.\n186 Power Sources: Modular sources carry high-MTBF label.\n178 Discrete Semiconductors\n190 Components\n196 Packaging & Materials\n\nDEPARTMENTS\n109 Editorial: The politicians\n7 Across the Desk\n209 Evaluation Samples\n210 New Literature\n214 Bulletin Board\n214 Vendors Report\n220 Advertisers' Index\n222 Product Index\n224 Information Retrieval Card\nYou can go into production of higher density memory systems confidently now that Intel's new 2104 16-pin, 4096-bit dynamic RAM is in stock at Intel distributors, and readily available in OEM quantities.\n\nWe are mass producing the 2104 on the same fabrication lines and with the same silicon gate n-channel MOS process as the industry standard 2107B 22-pin 4K RAM.\n\nIntel's 16-pin RAM assures you fast, reliable parts as well as delivery in volume. The Intel 2104 is based on the proven single-transistor cell design of the Intel 2107B, the highest performance 22-pin 4K MOS RAM. Like the 2107B, the 2104 chip is much smaller than other 4K RAM chips produced today.\n\nThe fastest available 16-pin 4K RAMs are also in the 2104 series. Our 2104-2 guarantees an access time of only 250 nanoseconds and a cycle time of 375 nanoseconds over the full 0 to 70°C operating temperature range.\n\nTo keep system costs low, the 2104 operates on standard -5, +5 and +12V power supplies, and TTL I/O levels. All inputs including clock\n\n
\n\n
\n
INTEL'S STANDARD 4K RAM FAMILY
\n
Max. Access Time (ns), 0-70°C
\n
Min. Cycle Time (ns), 0-70°C
\n
\n\n\n
\n
Part Number
\n
Pins
\n
Read or write
\n
\n
\n
D2104-2
\n
16
\n
250
\n
\n
\n
D2104-4
\n
16
\n
300
\n
\n
\n
D2104
\n
16
\n
350
\n
\n
\n
2107B
\n
22
\n
200
\n
\n
\n
2107B-2
\n
22
\n
220
\n
\n
\n
2107B-4
\n
22
\n
270
\n
\n
\n
2107B-6
\n
22
\n
350
\n
\n\n
\ninputs are fully TTL compatible.\n\nOverall system advantages of the 2104 are detailed in a new application brief, \"Which Way for 4K... 16, 18, or 22 Pin?\" It explains why the 16-pin 2104 is best for very compact systems such as minicomputers, microcomputers, terminals, business equipment, scientific calculators and anywhere high density is needed.\n\nMoreover, we show how the 16-pin standard is compatible with the next generation of even higher density memories. The application brief also tells why the 2107B's simple, straightforward 22-pin design has become an industry standard for computer main memories and many other applications.\n\nNow the industry has two standard configurations—16 pins with multiplexed addresses and 22 pins with parallel addresses. Whichever way you go, you'll find Intel ready to support both in volume production. For delivery of the 2104 or 2107B contact our franchised distributors: Almac/Stroum, Component Specialties, Cramer, Elmar, Hamilton/Avnet, Industrial Components, Liberty, Pioneer, Sheridan or L.A. Varah.\n\nFor your copy of \"Which Way for 4K...\" or data sheets on any of our 4K RAMs write: Intel Corporation, 3065 Bowers Avenue, Santa Clara, California 95051.\n\nintel delivers.\nTry this with a CRT or a digital display\n\nWhen it comes to displaying complete messages and graphics you just can't beat Shelly Multi-Message Modules.\n\nThink of them as tiny, random access, electronically-controlled slide projectors displaying characters 0.5\" or 0.7\" high.\n\nEach module can instantly display any of 12, 24 or 64 digitally selectable messages. In black & white or any combination of colors.\n\nUnlike CRT's and digital displays, you're not limited to alphanumerics either. With Shelly's versatile film chip you can display letters, numbers, words, complete messages (up to 5 lines), charts, graphs, photographs. You name it! And simultaneous illumination of up to 3 projectors within a module makes it possible to overlay additional words, symbols, numerals or colors to vary the meaning of a message.\n\nApplications are mind-boggling. Here's just a few. Teaching machines, aircraft cockpits, automobile dashboards, elevators, industrial control systems, electronic games, hospitals, security systems, point of sale terminals. The list is endless.\n\nWithout a doubt, when it comes to displaying a number of preselected messages, Shelly Multi-Message Modules provide the maximum in versatility at a minimum price.\n\nCall Shelly today.\n\nshelly associates\nA Subsidiary of Datatron, Inc.\n1562 REYNOLDS AVENUE, SANTA ANA, CALIFORNIA 92705\nPHONE (714) 549-3414 TWX 910-595-1859\nINDICATORS • MULTI MESSAGE DISPLAYS • FIBER OPTICS • ANNUNCIATORS\n\nSr. Vice President, Publisher\nPeter Coley\n\nEditors\nEditorial Offices\n50 Essex St.\nRochelle Park, NJ 07662\n(201) 843-0550\nTWX: 710-990 5071\nCable: Haydenpubs Rochellepark\n\nEditor-in-Chief George Rostky\nManaging Editors:\nRalph Dobriner\nMichael Elphick\n\nAssociate Editors:\nDave Bursky\nJules H. Gilder\nMorris Grossman\nJohn F. Mason\nStanley Runyon\nEdward A. Torrero\n\nContributing Editors:\nPeter N. Budzilovich\nAlberto Socolovsky\nNathan Sussman\n\nEditorial Field Offices\nEast\nJim McDermett, Eastern Editor\nP.O. Box 272\nEasthampton", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": "5, where causing the silent mode to be overridden comprises:\nchanging a setting of the user device based on receiving the first message including the first prompt,\nthe setting relating to the silent mode; and\nwhere providing the first alert and the second alert comprises:\nproviding the first alert and the second alert based on changing the setting of the user device.\n\n18. The method of claim 15, where providing the first alert and the second alert comprises:\nproviding an audible alert by playing an audio file; and\nproviding a visual alert by running an application,\nthe application activating a light emitting diode associated with the user device.\n19. The method of claim 15, where the first message includes the text of the first prompt and additional text.\n20. (canceled)\n21. The user device of claim 1, where the first alert is audible and the second alert is visual.\n22. The user device of claim 1, where the one or more processors are further to:\n determine that a peripheral device is connected to the user device; and\n where the one or more processors, when providing the first alert and the second alert, are to:\n provide the first alert and the second alert based on determining that the peripheral device is connected\n to the user device.\n23. The non-transitory computer-readable medium of claim 8, where the first alert is audible and the second alert\nis visual.\n24. The method of claim 15, where the first alert is audible and the second alert is visual.\n25. The method of claim 15, further comprising:\n determining that a peripheral device is connected to the user device; and\n where providing the first alert and the second alert comprises:\n providing the first alert and the second alert based on determining that the peripheral device is connected\n to the user device.\n\n* * * * *<|endoftext|>Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series Switches Best Practices Guide\n\nFirst Published: November 30, 2015\nLast Updated: December 14, 2015\n\nCisco Systems, Inc.\nwww.cisco.com\n\nCisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.\nPreface vii\n\nAudience iii-vii\n\nConventions vii\n\nObtaining Documentation and Submitting a Service Request viii\n\nEase of Deployment 1-1\n\nPurpose 1-1\n\nConfiguration Tool 1-2\n\nCatalyst Switch Configuration Best Practices 1-2\n\nLAN Access Switch Topology 1-4\n\nSwitch Address Plan 1-5\n\nInitial Switch Configuration 2-7\n\nPurpose 2-7\n\nPrerequisites 2-7\n\nIdentify Configuration Values 2-8\n\nAssign Initial Management Information 2-8\n\nConfigure the Hostname for Switch Identification 2-9\n\nConfigure Secure HTTPS and Secure Shell for Secure LAN Management 2-9\n\nConfigure SNMP for Remote Management 2-10\n\nConfigure Local Login and Password for Switch Access 2-10\n\nConfigure Centralized User Authentication Through TACACS+ 2-10\n\nAssign an IP Address to the Switch 2-11\n\nConfigure the Management IP Address on an Out-of-Band Interface 2-12\n\nConfigure the Management IP Address on an In-Band Interface 2-14\n\nCreate a Management VLAN in Hardware 2-15\n\nVerify Basic Switch Configuration 2-17\n\nShow Running Configuration for Initial Management Information 2-17\n\nSwitch Stack Update 3-21\n\nPurpose 3-21\n\nPrerequisites 3-21\n\nIdentify Configuration Values 3-22\nLAN Access Switch Topology with Configured FTP Server 3-22\nPerforming the Stack Update 3-23\n Obtain the Switch Software Image 3-23\n Check the Software Version on the Stack Members 3-23\n Configure the Switch to Run in Install Mode 3-24\n Download the Switch Image from Cisco.com to a FTP Server 3-25\n Update the Switch Stack Image 3-27\n Enable Switch Image Auto-Upgrade 3-27\n Verify that Stack Members Are Running the Same Software Image 3-28\n\nGlobal System Configuration 4-29\nPurpose 4-29\nPrerequisites 4-29\nIdentify Configuration Values 4-29\nAssign Global Configuration Information 4-30\n Configure High Availability on the Switch Stack 4-31\n Configure VTP Transparent Mode 4-31\n Enable Rapid Per-VLAN Spanning Tree 4-32\n Configure BPDU Guard for Spanning-Tree PortFast Interfaces 4-32\n Configure ULDL to Detect Link Failure 4-33\n Configure an Access List to Limit Switch Access 4-33\n Configure System Clock and Console Timestamps 4-34\n Configure DHCP Snooping Security Features 4-34\n Configure ARP Inspection 4-34\n Configure EtherChannel Load Balancing 4-35\n Create Access Layer VLANs 4-35\n Create IPv6 First Hop Security Policies 4-35\n Increase the TFTP Block Size 4-36\n Enable New Members to Automatically Update to the Switch Stack Image 4-36\n Verify Global Switch Configuration 4-37\nShow Running Configuration For Global Management Information 4-37\n\nUplink Interface Connectivity 5-41\nPurpose 5-41\nPrerequisites 5-41\nRestrictions 5-41\nIdentify Configuration Values 5-42\nLAN Access Switch Topology with Uplinks to a Distribution Switch or Distribution Router 5-43\nConfigure Uplink Interface Connectivity 5-44\nPreface\n\nAudience\n\nThis document is written for managing the Cisco Catalyst 3850 Series Switches and the Cisco 3650 Series switches and switch stacks in their network. A basic understanding of Ethernet networking is expected. Cisco Certified Network Associate level (CCNA) knowledge is helpful, but not required.\n\nConventions\n\nThis document uses the following conventions:\n\n
\n\n
\n
Convention
\n
Indication
\n
\n\n\n
\n
italic blue font
\n
Example configuration values that are replaced with reader values.
\n
\n
\n
bold font
\n
Commands and keywords and user-entered CLI appear in bold font.
\n
\n
\n
italic font
\n
Document titles, new or emphasized terms, and arguments for which you supply values are in italic font.
\n
\n
\n
[ ]
\n
• Default responses to system prompts are in square brackets.
\n
\n
\n
\n
• Elements in square brackets are optional.
\n
\n
\n
{x
\n
y
\n
\n
\n
[x
\n
y
\n
\n
\n
string
\n
A nonquoted set of characters. Do not use quotation marks around the string, or the string will include the quotation marks.
\n
\n
\n
courier font
\n
Terminal sessions and information the system displays appear in courier font.
\n
\n
\n
< >
\n
Nonprinting characters such as passwords are in angle brackets.
\n
\n
\n
!, #
\n
An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line.
\n
\n\n
\n\nNote\n\nMeans reader take note. Notes contain helpful suggestions or references to material that is not covered in the manual.\nThe tips information might not be troubleshooting or even an action, but could be useful information, similar to a Timesaver.\n\nYou can save time by performing the action described in the paragraph.\n\nObtaining Documentation and Submitting a Service Request\n\nFor information on obtaining documentation, using the Cisco Bug Search Tool (BST), submitting a service request, and gathering additional information, see What’s New in Cisco Product Documentation at: http://www.cisco.com/c/en/us/td/docs/general/whatsnew/whatsnew.html.\n\nSubscribe to What’s New in Cisco Product Documentation, which lists all new and revised Cisco technical documentation as an RSS feed and deliver content directly to your desktop using a reader application. The RSS feeds are a free service.\nEase of Deployment\n\nThis document describes best practices for deploying your Cisco Catalyst 3850 Series and Cisco Catalyst 3650 Series switches.\n\nNote\n\nUnless otherwise noted, the term switch refers to a standalone Catalyst 3850 switch, a Catalyst 3650 switch, or a switch stack.\n\nA Cisco switch deployment best practice is a preferred configuration method to employ on your Catalyst switches. It is a proven and tested way to improve network security, performance, and availability.\n\nA best practice configuration includes an explanation of why you should perform a given task and a sample snapshot of a full running configuration that you can extrapolate for your specific scenario.\n\nTip\n\nUse the configuration recommendations in this document as a template for your switch deployments.\n\nNote\n\nMany", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ", blue\n gray scale data to the plurality of data lines;\n a direct current to direct current (DC-DC) converter for\n outputting a DC voltage for carrying out a bend transition\n on the OCB liquid crystal;\n a switch for selecting the output voltage of the DC-DC\n converter and a common voltage and transferring the\n voltages to the common electrode;\n a light source controller for controlling red, green, and\n blue light emitting diodes to sequentially emit light to\n the liquid crystal display panel; and\n a timing controller for controlling operations of the scan\n driver, the source driver, the switch, and the light\n source controller,\nwherein one frame is divided into red, green, and blue\nfields and the switch applies the output voltage of the\nDC-DC converter to the common electrode before a\nstart of each field to reset the OCB liquid crystal.\n10. The LCD of claim 9, wherein the output voltage of the\n DC-DC converter is 15V to 30V.\n11. The LCD of claim 9, wherein the source driver does\n not apply the red, green, and blue gray scale data when the\n switch selects the output voltage of the DC-DC converter.\n12. The LCD of claim 9, wherein the OCB liquid crystal\n has an optical transmittance of zero when the OCB liquid\n crystal is reset.\n13. The LCD of claim 9, wherein each pixel comprises:\n a switching transistor for transferring the red, green, and\n blue gray scale data transferred via the data lines to the\n pixel electrode in response to the scan signal of the scan\n lines; and\n a storage capacitor for storing the gray scale data.\n14. A liquid crystal display device (LCD), comprising:\n a liquid crystal display panel having a plurality of pixels,\n each pixel being positioned at each intersection\n between a plurality of scan lines and a plurality of data\n lines and including a liquid crystal capacitor composed\n of a common electrode, a pixel electrode, and an\n optically compensated birefringence (OCB) liquid\n crystal;\n a scan driver for applying a scan signal to the plurality of\n scan lines;\n a source driver for applying gray scale data to the plurality\n of data lines;\n a direct current to direct current (DC-DC) converter for\n outputting a DC voltage for carrying out a bend transition\n on the OCB liquid crystal;\n a switch for selecting the output voltage of the DC-DC\n converter and a common voltage and transferring the\n voltages to the common electrode;\n a light source controller for controlling a backlight for\n emitting light to the liquid crystal display panel; and\n a timing controller for controlling operations of the scan\n driver, the source driver, the switch, and the light\n source controller,\nwherein the switch applies the output voltage of the\nDC-DC converter to the common electrode to reset the\nOCB liquid crystal before the gray scale data are\napplied to the plurality of pixels.\n15. The LCD of claim 14, wherein the output voltage of the\n DC-DC converter is 15V to 30V.\n16. The LCD of claim 14, wherein the source driver does not\n apply the gray scale data when the switch selects the\n output voltage of the DC-DC converter.\n17. The LCD of claim 14, wherein the OCB liquid crystal\n has an optical transmittance of zero when the OCB liquid\n crystal is reset.\n18. The LCD of claim 14, wherein the backlight comprises\n one of a white light emitting diode (LED) and a cold\n cathode fluorescence lamp (CCFL) which emits white light.\n19. The LCD of claim 18, further comprising red, green, and\n blue color filters positioned on the common electrode of\n the plurality of pixels for filtering light emitted from the\n backlight.\n20. The LCD of claim 14, wherein each pixel includes:\n a switching transistor for transferring the gray scale data\n transferred via the data lines to the pixel electrode in\n response to the scan signal of the scan lines; and\n a storage capacitor for storing the gray scale data.\n21. A method of driving a liquid crystal display device\n (LCD) including a plurality of pixels having an optically\n compensated birefringence (OCB) liquid crystal positioned\n between a common electrode to which a common voltage is\n applied and a pixel electrode to which gray scale data are\n applied, a direct current to direct current (DC-DC) converter\n outputting a voltage for carrying out a bend transition on\n the OCB liquid crystal at a fast speed, and a backlight outputting\n light to the plurality of pixels, the method comprising:\n (a) applying a voltage to the OCB liquid crystal from the\n DC-DC converter to carry out the bend transition on the\n OCB liquid crystal at an initial start of the LCD;\n (b) applying the gray scale data of a frame to the pixel\n electrode in the frame;\n (c) applying a voltage to the common electrode from the\n DC-DC converter to reset the OCB liquid crystal after\n the step (b);\n (d) applying the gray scale data of a second frame to the\n pixel electrode in the second frame; and\n (e) repeating the steps (b) to (d).\n22. The method of claim 21, wherein the output voltage of the DC-DC converter is 15V to 30V.\n\n23. The method of claim 21, wherein the gray scale data are not applied in the step (c).\n\n24. The method of claim 21, wherein the OCB liquid crystal has an optical transmittance of zero when the OCB liquid crystal is reset.\n\n25. The method of claim 21, wherein the backlight emits light during the steps (b) to (d).\n\n26. The method of claim 21, wherein the backlight comprises a red light emitting diode (LED), a green LED, and a blue LED which sequentially emit red, green, and blue light.\n\n27. The method of claim 21, wherein the backlight comprises one of a white light emitting diode (LED) and a cold cathode fluorescence lamp (CCFL) which emits white light.\n\n28. The method of claim 27, further comprising red, green, and blue color filters positioned on the common electrode of the plurality of pixels and filtering light emitted from the backlight.\n\n29. A method of driving a liquid crystal display device (LCD) including a plurality of pixels having an optically compensated birefringence (OCB) liquid crystal positioned between a common electrode to which a common voltage is applied and a pixel electrode to which red, green, and blue gray scale data are sequentially applied, a direct current to direct current (DC-DC) converter outputting a voltage for carrying out a bend transition on the OCB liquid crystal at a fast speed, and a backlight having red, green, and blue light sequentially transmitted to each of the pixels, the method comprising:\n\n (a) applying a voltage to the OCB liquid crystal from the DC-DC converter to carry out a bend transition on the OCB liquid crystal at an initial start of the LCD;\n\n (b) dividing one frame into red, green, and blue fields, and applying the red gray scale data to the pixel electrode in the red field;\n\n (c) applying a voltage to the common electrode from the DC-DC converter to reset the OCB liquid crystal after the step (b);\n\n (d) applying the green gray scale data to the pixel electrode in the green field;\n\n (e) applying a voltage to the common electrode from the DC-DC converter to reset the OCB liquid crystal after the step (d);\n\n (f) applying the blue gray scale data to the pixel electrode in the blue field;\n\n (g) applying a voltage to the common electrode from the DC-DC converter to reset the OCB liquid crystal after the step (f); and\n\n (h) repeating the steps (b) to (g).\n\n30. The method of claim 29, wherein the output voltage of the DC-DC converter is 15V to 30V.\n\n31. The method of claim 29, wherein the red, green, and blue gray scale data are not applied in the steps (c), (e), and (f).\n\n32. The method of claim 29, wherein the OCB liquid crystal has an optical transmittance of zero when the OCB liquid crystal is reset.\n\n33. The method of claim 29, wherein the backlight emits light during the steps (b) to (h).\n\n34. The method of claim 29, wherein the backlight comprises a red light emitting diode (LED), a green LED, and a blue LED which sequentially emit red, green, and blue light.\n\n35. A method of driving a liquid crystal display device (LCD) including a plurality of pixels having an optically compensated birefringence (OCB) liquid crystal positioned between a common electrode to which a common voltage is applied and a pixel electrode to which gray scale data are applied, a direct current to direct current (DC-DC) converter outputting a voltage for carrying out a bend transition on the OCB liquid crystal at a fast speed, and a backlight outputting light to the plurality", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": " address has been written to. The second circuitry group 202 further carries out the function of disabling the outputting of a delayed cue signal if the read address has not been written to. The second circuitry group 202 can include a comparator 42, a flip flop 56, and a gate circuit 60. In the embodiment shown in the figure, the memory output signal 54 is initially gated or blocked by gate 60. Once the read address 34 exceeds the delay value 38, the comparator output 44 and the latched comparator value 58 go high, thereby enabling the gate 60 to produce the gated cue signal 62. A logic circuit 64 can then be employed to condition the gated cue delay 62 to produce a delayed cue signal 66. In an alternate embodiment, the second circuitry group can disable the reading from the memory element 51 if the read address has not been written to, rather than gating the output of the memory element 51 to disable the outputting of a delayed cue signal.\nThe cue delay circuit further includes a sequence circuit. The sequence circuit controls the timing associated with reading and writing from the memory element 51 and with the timing associated with the first and second circuitry groups 200 and 202. The sequence circuit can include a state machine 20, a binary counter, a shift register, a microcontroller, a monostable delay circuit, or combinations thereof.\n\nFIG. 2 depicts a schematic for a method of using the embodied integrated circuit in an ink jet printing system. The method begins by sending a start pulse to initialize a state machine (Step 100). The initializing step entails clearing the counter, a flip flop, and a logic circuit. The counter is cleared and a read address is set to zero. The flip flop is cleared to set a latch comparator output to zero. The logic circuit is cleared to set the delayed cue signal to zero. Concurrently, a cue delay value and the read address from the counter are input to an adder to generate a write address (Step 102). The write address is supplied to a multiplexer along with the read address from the counter.\n\nThe methods continue by inputting a first buffered control signal from the state machine to a counter in order to increment a read address by one (Step 104). The read address is then input into the comparator and a multiplexer (Step 106). While inputting the cue delay value to the adder, the cue delay value is input to a comparator to set the comparator output to a logic high value if the read address is greater than the cue delay value (Step 108).\n\nA second buffered control signal from the state machine causes the multiplexer to provide the write address to a memory element. The second buffered control signal provides a multiplexer output that is equal the value of the write address (Step 110). The comparator output is latched using a gate circuit (Step 112). A tachometer input is entered into the state machine (Step 114).\n\nThe next steps in the methods entail inputting a cue signal to a memory element and inputting a third buffered control signal from the state machine to the memory element (Step 116). The third buffered control signal causes the current state of the cue signal to be written to the address of the memory element and causes the current state of the cue signal to correspond to the write address received from the multiplexer. The second buffered control signal from the state machine works in conjunction with the third buffered control signal to cause the output of the multiplexer to equal the value of the read address (Step 118).\n\nThe memory output is sent to the gate circuit (Step 120) and the gated cue signal is passed to a logic circuit if the latched comparator output is set to logic high (Step 122). A fourth buffered control signal from the state machine enables the logic circuit to latch the gated cue signal to form the delayed cue signal (Step 124). The delayed cue signal is then transmitted to the ink jet printing system (Step 126).\n\nThe steps following the initializing step are repeated until a new start pulse is received by the state machine (Step 128).\n\nIn an alternative embodiment, the methods include a step of pulsing one or more buffered control signals.\n\nIn still another embodiment, the methods can optionally include the step of employing a cue pulse conditioner to latch the cue signal until the cue signal can be written to the memory element. If a cue pulse conditioner is used, a start pulse can be used to initialize a cue pulse conditioning circuit.\n\nThe embodiments have been described in detail with particular reference to certain preferred embodiments thereof, but it will be understood that variations and modifications can be effected within the scope of the embodiments, especially to those skilled in the art.\n6. The method of claim 1, wherein the read address, the write address or combination thereof is incremented by a value of one for each additional tachometer input.\n\n7. The method of claim 6, wherein the write address is greater than or equal to the read address.\n\n8. The method of claim 1, wherein the read address, the write address or combination thereof is decremented by a value of one for each additional tachometer input.\n\n9. The method of claim 8, wherein the write address is less than or equal to the read address.\n\n10. The method of claim 1, further comprising the step of retrieving a cue delay value prior to writing the cue signal to the write address.\n\n11. The method of claim 1, wherein the memory element is selected from the group consisting of a random access memory (RAM), a first in-first out memory (FIFO), a first in-last out memory (LIPO), a circular buffer, a register in an FPGA, and combinations thereof.\n\n12. The method of claim 1, wherein prior to the step of receiving the tachometer input, the read address, the write address, or combination thereof, the read address, the write address, or combination thereof is set to a default value.\n\n13. The method of claim 12, wherein the default value is zero.\n\n14. A cue delay circuit for a digital printing system, wherein the cue delay circuit comprises:\n a. a memory element;\n b. a first circuitry group adapted to create a write address and a read address for the memory element, respectively;\n c. a sequence circuit adapted to control a timing associated with reading and writing of the read address and the write address of the memory element; and\n d. a second circuitry group adapted to verify that the read address of the memory element has been written to.\n\n15. The cue delay circuit of claim 14, wherein the first circuitry group comprises:\n a. an adder adapted to create a difference between the write address and the read address;\n b. a multiplexer adapted to switch between the read address and the write address; and\n c. a counter.\n\n16. The cue delay circuit of claim 14, wherein the sequence circuit is a member of the group consisting of a state machine, a binary counter, a shift register, a microcontroller, a monostable delay circuit, and combinations thereof.\n\n17. The cue delay circuit of claim 14, wherein the second circuitry group comprises a comparator, a flip flop, and a gate circuit.\n\n* * * * *<|endoftext|>Signal Boosters\n\n1 Purpose\nImplement an engagement procedure with specific guidelines for CFW Fort Worth Regional Radio System (FWRRS) customers to request approval to procure, install and operate signal boosters.\n\n2 Scope\nThis policy applies to internal and external agencies that utilize the CFW Fort Worth Regional Radio System network for primary communications and require enhanced radio communications in specific use cases that may be achieved by the installation of signal boosters. Signal boosters are also commonly referred to as bidirectional amplifiers or signal amplifiers.\n\nExternal agencies that are not FCC license holders must obtain documented consent by the City of Fort Worth if their signal booster operates on the FWRRS network. This stipulation is a requirement of the FCC Report and Order referenced in section 3.\n\n3 References\nFCC 13-21A1 Report and Order\n\n4 Conditions for Exemption\nExceptions to the policy must be approved by the Senior Manager over Wireless Communications.\n\n5 Justification\nPublic safety entities that operate private land mobile radio (PLMR) and public safety radio services provide mission critical and emergency response radio communications services to their customers. Because Part 90 channels are interleaved, PLMR licenses are sometimes not adjacent and create unique design and interference considerations. As such, the FCC has defined a specific class of industrial signal boosters with regulatory considerations as defined in the Report and Order referenced in section 3.\nIt is critical that signal boosters installed for improved or additional radio coverage in specific facilities meet FCC and industry standard specifications for optimal performance and functionality. Signal boosters must not introduce interference or introduce adverse coverage effects to the FWRRS. Therefore, a policy is necessary to enforce their implementation and ongoing performance.\n\n6 Signal Boosters Implementation Procedures\n\nThe FCC Report and Order 13-21A1 establishes rules applicable to new and existing signal boosters, which are effective March 1, 2014.\n\nThe goal of the regulatory framework is to ensure signal boosters do not degrade the performance of Public Safety wireless networks and are designed to mitigate interference. Key points are summarized below, but are not all inclusive. Agencies operating and/or requesting signal boosters must comply with the FCC Report and Order referenced in section 3 and applicable FCC Part 90 rules in their entirety.\n\n- Signal boosters installed for Public Safety entities are considered industrial as defined by FCC part 90", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": ">Action Command\n
\n\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": " the USB/GPIB interface. The USB/GPIB Interface Detected dialog box (Figure 9-1) appears.\n\n**NOTE**\n\nDo not connect two or more USB/GPIB interfaces.\n\n**Figure 9-1** USB/GPIB Interface Detected dialog box\n\n\n\n**Step 2.** Confirm that VISA Interface Name is set to GPIB0 (1 in Figure 9-1) and SICL Interface Name is set to hpib7 (2 in Figure 9-1) and then click the **Accept** button (3 in Figure 9-1). If the setting is correct, the procedure is complete. If the setting is different, click the **Edit** button (4 in Figure 9-1).\nStep 3. The USB to GPIB Configuration dialog box (Figure 9-2) appears. Make the setting enclosed in the thick lines in Figure 9-2 (1 in Figure 9-2) according to the figure and then click the OK button (2 in Figure 9-2).\n\nFigure 9-2 USB to GPIB Configuration dialog box\n\nIf you need to check/change the setting of the USB/GPIB interface after connecting the USB/GPIB interface, follow these steps:\n\nStep 1. Open the shortcut menu by right-clicking and select System (Or press [System]).\n\nStep 2. Click the GPIB Setup Menu button.\n\nStep 3. Press System Controller Configuration.\n\nStep 4. The IO Config dialog box (Figure 9-3) appears. Select (highlight) GPIB0 hpib7 (1 in Figure 9-3) and then click the Edit button (2 in Figure 9-3).\n\nNOTE In the IO Config dialog box, do not click buttons other than specified here or do not change other settings because doing so may cause serious damage to the functions of the E4991A.\nFigure 9-3 IO Config dialog box\n\nStep 5. The USB to GPIB Configuration dialog box (Figure 9-2) appears. Check/change the setting of the USB/GPIB interface and then click the OK button (2 in Figure 9-2).\n\nStep 6. In the USB to GPIB Configuration dialog box, click the OK button (3 in Figure 9-3).\nSetting the Internal Clock\n\nThe E4991A has a built-in clock for the date and time. This internal clock is used for recording the date and time of when internal data or a VBA program is saved as a file.\n\nProcedure for setting the internal clock\n\n**NOTE**\nUse the mouse or keyboard for the following operation.\n\n**Step 1. Exiting the E4991A system program.**\n\na. Click **System - Exit** in the menu bar.\n\n The **Enter Password to exit** dialog box (Figure 9-4) opens.\n\n\n\nb. Click the **Keyboard...** button and use the displayed character entry dialog box or use an external keyboard to enter the password **e4991a** in the **Password** box.\n\nc. Click the **OK** button to exit the E4991A system.\n\n**Step 2. Setting the date and time.**\n\na. Click the **Start** button in the lower-left corner of the screen and select **Settings - Control Panel** (Figure 9-5). This operation will open the **Control Panel** window (Figure 9-6).\n\n\nSetup and Use of Control/Management Functions\n\nSetting the Internal Clock\n\nFigure 9-6 Control Panel window\n\nb. After double-clicking the **Date/Time** icon, the Date/Time Properties dialog box (Figure 9-7) will open.\n\nFigure 9-7 Date/Time Properties dialog box\n\nc. Set the date and time in the **Date** and **Time** areas, respectively.\n\nd. Click the **Time Zone** tab.\n\nFigure 9-8 Date/Time Properties dialog box (Time Zone tab)\ne. Click the t button to select the time zone.\n\nf. If you want to set daylight savings time automatically, enter a check mark (√) in the **Automatically adjust clock for daylight saving changes** check box.\n\ng. Click the **OK** button.\n\n**NOTE**\n\nWhen you want to execute a setting change for the mouse at the same time, proceed to Step 3 on page 200 for “Setting the Mouse” (doing both procedures at this time will require you to restart the E4991A only once).\n\nh. Click the x button in the **Control Panel** window to close the window.\n\n**Step 3. Shutting down and restarting the E4991A.**\n\na. Click **Start - Shut Down...** (Figure 9-9).\n\n**Figure 9-9** \nClick **Start - Shut Down.**\n\nb. Click the **Shut down** option button and then click the **OK** button (Figure 9-10). The E4991A will shut down.\n\n**Figure 9-10** \nShut down dialog box\n\nc. When the power of the E4991A is off, press the Standby switch once to activate the switch and then press it again to turn on the power.\nSetting the Mouse\n\nThe user can change the setup for the mouse connected to the E4991A and the movement of the pointer.\n\nSetup Step\n\nNOTE\n\nBe sure to use a mouse and a keyboard for mouse setup operations.\n\nStep 1. Exiting the E4991A system program.\n\na. Click System - Exit in the menu bar. The Enter Password to exit dialog box (Figure 9-2) opens.\n\nb. Click the Keyboard... button and use the displayed character entry dialog box or use an external keyboard to enter the password e4991a in the Password box.\n\nc. Click the OK button to exit the E4991A system.\n\nStep 2. Click the Start button in the lower-left corner of the screen and select Settings - Control Panel (Figure 9-5). This will open the Control Panel window (Figure 9-11).\n\nFigure 9-11 Control Panel Window\n\nStep 3. Double-click the Mouse icon (1 in Figure 9-11) in the Control Panel window.\n\nNOTE\n\nDo not click icons other than specified here or do not change other settings because doing so may cause serious damage to the functions of the E4991A.\nStep 4. The Mouse Properties dialog box (Figure 9-12) is displayed.\n\nDefine the setup for a right-handed/left-handed person in the **Buttons configuration** area. Define also the setup for double-click speed in the **Double-click speed** area.\n\n\n\n**Figure 9-12** Mouse Properties Dialog Box (Buttons tab)\n\nStep 5. Click the **Pointers** tab (Figure 9-13).\n\n\n\n**Figure 9-13** Mouse Properties Dialog Box (Pointers tab)\nStep 6. Enter a registration name into the **Scheme** box and specify the shapes of pointers for the registration name in the box below.\n\nTo create a registration name, click the **Save As...** button. Enter the registration name into the **Save Scheme** dialog box that appears, and click the **OK** button.\n\nStep 7. Click the **Motion** tab (Figure 9-14).\n\n**Figure 9-14 Mouse Properties Dialog Box (Motion tab)**\n\nStep 8. Specify the pointer speed in the **Pointer speed** area and the pointer trail in the **Pointer trail** area.\n\nStep 9. Click the **OK** button.\n\nStep 10. Click the **×** button (1 in Figure 9-11) at the corner in the Control Panel window.\n\n---\n\n**NOTE**\n\nWhen you want to execute a setting change for the internal clock at the same time, proceed to Step 2-b for “Setting the Internal Clock” on page 197. (doing both procedures at this time will require you to restart the E4991A only once).\n\nStep 11. Shutting down and restarting the E4991A.\n\na. Click **Start - Shut Down...** (Figure 9-7).\n\nb. Click the Shut down option button and then click the **OK** button (Figure 9-8). The E4991A will shut down.\n\nc. When the power of the E4991A is off, press the Standby switch once to activate the switch and then press it again to turn on the power.\nConfirmation of Options and Firmware Version\n\nThe options and the version of firmware installed in the E4991A can be confirmed by following the procedure below.\n\nOperation Procedure\n\n**Step 1.** Open the shortcut menu by right-clicking and select **System** (Or press **System**).\n\n**Step 2.** Click the **About E4991A** button. This opens the **About E4991A** dialog box (Figure 9-15), where you can confirm the installed options and firmware version.\n\n**Step 3.** Close the **About E4991A** dialog box by clicking the **OK** button.\nSystem Recovery\n\nBy executing system recovery, you can return the system of the E4991A (the Windows operating system and the firmware) to the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": "2 when they are not being driven. Open-drain signals always require pullups.\n\nUnused inputs should not be left floating. If they are input-only, they may be tied directly to Vcc or ground, or a pullup or pulldown resistor may be used. Unused outputs may be left unconnected. Unused I/O pins may be configured as outputs after reset and left unconnected.\n\nIf the MC68302 is to be held in reset for extended periods of time in an application (other than what occurs in normal power-on reset or board test sequences) due to a special application requirement (such as VDD dropping below required specifications, etc.), then three-stated signals and inputs should be pulled up or down. This decreases stress on the device transistors and saves power.\n\nSee the RESET pin description for the condition of all pins during reset.\nSECTION 6 \nELECTRICAL CHARACTERISTICS\n\nThe AC specifications presented consist of output delays, input setup and hold times, and signal skew times. All signals are specified relative to an appropriate edge of the clock (CLKO pin) and possibly to one or more other signals.\n\n6.1 MAXIMUM RATINGS\n\n
\n\n
\n
Rating
\n
Symbol
\n
Value
\n
Unit
\n
\n\n\n
\n
Supply Voltage
\n
( V_{DD} )
\n
-0.3 to +7.0
\n
V
\n
\n
\n
Input Voltage
\n
( V_{in} )
\n
-0.3 to +7.0
\n
V
\n
\n
\n
Operating Temperature Range
\n
( T_A )
\n
0 to 70
\n
°C
\n
\n
\n
MC68302
\n
\n
-40 to 85
\n
°C
\n
\n
\n
MC68302C
\n
\n
\n
\n
\n
\n
Storage Temperature Range
\n
( T_{stg} )
\n
-55 to +150
\n
°C
\n
\n\n
\n\nThis device contains circuitry to protect the inputs against damage due to high static voltages or electric fields; however, it is advised that normal precautions be taken to avoid application of any voltage higher than maximum-rated voltages to this high-impedance circuit. Reliability of operation is enhanced if unused inputs are tied to an appropriate logic voltage level (e.g., either GND or \\( V_{DD} \\)).\n\n6.2 THERMAL CHARACTERISTICS\n\n
\n\n
\n
Characteristic
\n
Symbol
\n
Value
\n
Unit
\n
\n\n\n
\n
Thermal Resistance for PGA
\n
( \\theta_{JA} )
\n
25
\n
°C/W
\n
\n
\n
\n
( \\theta_{JC} )
\n
2
\n
°C/W
\n
\n
\n
Thermal Resistance for CQFP
\n
( \\theta_{JA} )
\n
40
\n
°C/W
\n
\n
\n
\n
( \\theta_{JC} )
\n
15
\n
°C/W
\n
\n
\n
Thermal Resistance for PQFP
\n
( \\theta_{JA} )
\n
42
\n
°C/W
\n
\n
\n
\n
( \\theta_{JC} )
\n
20
\n
°C/W
\n
\n\n
\n\n\\[ T_J = T_A + (P_D \\cdot \\theta_{JA}) \\]\n\n\\[ P_D = (V_{DD} \\cdot I_{DD}) + P_{I/O} \\]\n\nwhere:\n\n\\( P_{I/O} \\) is the power dissipation on pins.\n\nFor \\( T_A = 70°C \\) and \\( P_{I/O} = 0 \\ W, 16.67 \\ MHz, 5.5 \\ V, \\)\n\nand CQFP package, the worst case value of \\( T_J \\) is:\n\n\\[ T_J = 70°C + (5.5 \\ V \\cdot 130 \\ mA \\cdot 40°C/W) = 98.6°C \\]\n6.3 POWER CONSIDERATIONS\n\nThe average chip-junction temperature, $T_J$, in °C can be obtained from:\n\n$$T_J = T_A + (P_D \\cdot \\theta_{JA})$$ \\hspace{1cm} (1)\n\nwhere:\n\n- $T_A$ = Ambient Temperature, °C\n- $\\theta_{JA}$ = Package Thermal Resistance, Junction-to-Ambient, °C/W\n- $P_D = P_{INT} + P_{I/O}$\n- $P_{INT} = I_{DD} \\times V_{DD}$, Watts — Chip Internal Power\n- $P_{I/O}$ = Power Dissipation on Input and Output Pins — User Determined\n\nFor most applications $P_{I/O} < 0.3 \\cdot P_{INT}$ and can be neglected.\n\nIf $P_{I/O}$ is neglected, an approximate relationship between $P_D$ and $T_J$ is:\n\n$$P_D = K + (T_J + 273°C)$$ \\hspace{1cm} (2)\n\nSolving equations (1) and (2) for $K$ gives:\n\n$$K = P_D \\cdot (T_A + 273°C) + \\theta_{JA} \\cdot P_D^2$$ \\hspace{1cm} (3)\n\nwhere $K$ is a constant pertaining to the particular part. $K$ can be determined from equation (3) by measuring $P_D$ (at equilibrium) for a known $T_A$. Using this value of $K$, the values of $P_D$ and $T_J$ can be obtained by solving equations (1) and (2) iteratively for any value of $T_A$. \n\n### 6.4 POWER DISSIPATION\n\n
\n\n
\n
Characteristic
\n
Symbol
\n
Typ
\n
Max
\n
Unit
\n
\n\n\n
\n
Power Dissipation at 20 MHz (see Notes 1 and 2)
\n
PD
\n
93
\n
155
\n
mA
\n
\n
\n
Power Dissipation at 16.67 MHz (see Notes 1, 2, and 3)
\n
PD
\n
77
\n
130
\n
mA
\n
\n
\n
Power Dissipation at 8 MHz (see Notes 1 and 2)
\n
PD
\n
37
\n
65
\n
mA
\n
\n
\n
Power Dissipation at 4 MHz (see Notes 1, 2 and 7)
\n
PD
\n
TBA
\n
TBA
\n
mA
\n
\n
\n
Low Power Mode Dissipation at 16.67 MHz (see Notes 1 and 4)
\n
LPD
\n
66
\n
\n
mA
\n
\n
\n
Lowest Power Mode Dissipation at 16.67 MHz (see Notes 1 and 5)
\n
LPD
\n
51
\n
\n
mA
\n
\n
\n
Low Power Mode Dissipation at 8 MHz (see Notes 1 and 4)
\n
LPD
\n
34
\n
\n
mA
\n
\n
\n
Lowest Power Mode Dissipation at 8 MHz (see Notes 1 and 5)
\n
LPD
\n
27
\n
\n
mA
\n
\n
\n
Low Power Mode Dissipation at 4 MHz (see Notes 1 and 4)
\n
LPD
\n
TBA
\n
\n
mA
\n
\n
\n
Lowest Power Mode Dissipation at 4 MHz (see Notes 1 and 5)
\n
LPD
\n
TBA
\n
\n
mA
\n
\n
\n
Lowest Power Mode Dissipation at 50 kHz (see Notes 1 and 6)
\n
LPD
\n
2
\n
\n
mA
\n
Fan is defective \n> Fan is blocked \nNo light \n> Lamp is broken \n> Electronics defective \n> Fuse for halogen transformer is defective \nLED at the activation button glows orange instead of green \n> 90% of the manufacturer stated halogen lamp duration is reached.\nGreen control light at mains switch does not glow, device does not work \n> AC power line not connected \n> Device fuse is defective\nGreen control light at mains switch glows, but device does not work \n> AC power line defective \n> AC power line fuse defective\n**Foot switch**\nNo switch of light port when using the foot switch \n> foot switch not or not correctly connected \n> foot switch defective \n> Just one light port available\n**Microscope**\nNo activation / deactivation of microscope light port via microscope column \n> Cable of switching contact is not or not correctly connected \n> Switching contact in microscope column is defective / misaligned\n## Accessories\n\n### Accessories for halogen coldlight source\n- Adapter sleeve for Storz connection 507.0940.5\n- Adapter sleeve for Olympus connection 507.0940.6\n- Adapter sleeve for Pentax connection 507.0940.7\n- Adapter sleeve for Wolf connection 507.0940.8\n\n### Accessories for LED light module\n- **LED light source ATMOS LS 21 LED** 507.4600.0\n LED light source for direct connection to endoscopes and laryngoscopes with high performance white light LED, 2 Watt / 50 Lumen, LED service life approx. 50.000 h, Connection with quick coupling to any desired scope.\n\n### Accessories for LED light sources\n- **Lithium-ionic rechargeable battery for the mobile use** 507.4510.0\n For ATMOS LED light source resp. LED headlight with power and eco mode, charging indication and holding clip, with power and eco display.\n\n- **Universal battery quick charging power supply unit (100-240 V)** 011.1199.0\n including multinational adapter plug\n\n### Accessories for endoscope management\n- **Shock protection adapter** 508.0777.5\n for endoscopes Ø2.8-4 mm, teflon element for metal quiver\n- **Fixation adapter for plastics quiver** 508.0782.0\n\n### Accessories for LED stroboscope\n- **Body sound stroboscope adapter** 507.4775.0\n### Technical specifications at complete equipment\n\nPlease note the technical specifications of the single devices in the separate operating instructions!\n\n
\n\n**Accessories for halogen cold light source**\n- Adapter sleeve for Storz connection 507.0940.5\n- Adapter sleeve for Olympus connection 507.0940.6\n- Adapter sleeve for Pentax connection 507.0940.7\n- Adapter sleeve for Wolf connection 507.0940.8\n\n**Accessories for LED light module**\n- LED light source ATMOS LS 21 LED\n- LED light source for direct connection to endoscopes and laryngoscopes with high performance white light LED, 2 Watt / 50 Lumen, LED service life approx. 50.000 h, Connection with quick coupling to any desired scope.\n- 507.4600.0\n\n**Accessories for LED light sources**\n- Lithium-ionic rechargeable battery for the mobile use\n- For ATMOS LED light source resp. LED headlight with power and eco mode, charging indication and holding clip, with power and eco display.\n- 507.4510.0\n- Universal battery quick charging power supply unit (100-240 V) including multinational adapter plug 011.1199.0\n11.0 Disposal\n\n- The materials of the housing can be recycled completely.\n- The ATMOS S 61 Servant vision does not contain any hazardous goods.\n- The component parts of the ATMOS S 61 Servant vision must be disposed of correctly and the materials are to be separated carefully.\n12.1 Guidelines and Manufacturer’s Declaration - Emissions\n\nThe ATMOS", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-electronics_and_hardware-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-electronics_and_hardware-part2/part-00-00000.npy", "text": " | Region | Contact Information |\n |-----------------------------|----------------------------------------------------------|\n | APC Headquarters (U.S. and Canada) | (1) (800) 800-4272 (toll free) |\n | Latin America | (1) (401) 789-5735 (United States) apctchla@apc.com |\n | Europe, Middle East, Africa | (353) (91) 702020 (Ireland) apceurtech@apc.com |\n | Japan | (03) 5434-2021 jsupport@apc.com |\n\n - Local, country-specific centers: go to [http://www.apc.com/support/contact](http://www.apc.com/support/contact) for contact information.\n\n- Contact the APC representative or other distributor from whom you purchased your APC product for information on how to obtain local customer support.<|endoftext|>## Lenovo Global Technology\n\nThinkSystem SR530\n(3.60 GHz, Intel Xeon Platinum 8156)\n\n### Software Availability\nAug-2017\n\n### Hardware\n\n
\n\n
\n
CPU Name
\n
Intel Xeon Platinum 8156
\n
\n\n\n
\n
CPU Characteristics
\n
Intel Turbo Boost Technology up to 3.70 GHz
\n
\n
\n
CPU MHz
\n
3600
\n
\n
\n
FPU
\n
Integrated
\n
\n
\n
CPU(s) enabled
\n
8 cores, 2 chips, 4 cores/chip
\n
\n
\n
CPU(s) orderable
\n
1.2 chips
\n
\n
\n
Primary Cache
\n
32 KB I + 32 KB D on chip per core
\n
\n
\n
Secondary Cache
\n
1 MB I+D on chip per core
\n
\n\n
\n\n### Operating System\nSUSE Linux Enterprise Server 12 SP2 (x86_64)\nKernel 4.4.21-69-default\n\n### Compiler\nC/C++: Version 17.0.0.098 of Intel C/C++ Compiler for Linux;\nFortran: Version 17.0.0.098 of Intel Fortran Compiler for Linux\n\n### Auto Parallel\nYes\n\n### File System\nbtrfs\n\n### System State\nRun level 3 (multi-user)\n\n---\n\n### SPECfp®2006 = 125\n\n### SPECfp_base2006 = 122\n\n---\n\n### CPU2006 license:\n9017\n\n### Test sponsor:\nLenovo Global Technology\n\n### Tested by:\nLenovo Global Technology\n\n### Test date:\nJul-2017\n\n### Hardware Availability:\nAug-2017\n\n### Software Availability:\nNov-2016\n\n---\n\n
\n\n
\n
Benchmark
\n
Score
\n
\n\n\n
\n
410.bwaves
\n
51.8
\n
\n
\n
416.gamess
\n
49.3
\n
\n
\n
433.milc
\n
72.9
\n
\n
\n
434.zeusmp
\n
214
\n
\n
\n
436.cactusADM
\n
68.9
\n
\n
\n
437.leslie3d
\n
312
\n
\n
\n
444.namd
\n
36.5
\n
\n
\n
447.dealII
\n
70.8
\n
\n
\n
450.soplex
\n
47.2
\n
\n
\n
453.povray
\n
79.1
\n
\n
\n
454.calculix
\n
76.3
\n
\n
\n
459.GemsFDTD
\n
77.0
\n
\n
\n
465.tonto
\n
68.7
\n
\n
\n
470.lbm
\n
59.9
\n
\n
\n
481.wrf
\n
99.4
\n
\n
\n
482.sphinx3
\n
89.6
\n
\n\n
\n\n---\n\n**Continued on next page**\n## Lenovo Global Technology\n\n### SPECsp2006 Result\n\n
4", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\nAcidflut (The Wayward Girl) by Ingrid Dokka, Saturday September 11 at 2:00\n\nThe short Just Kidding stars Edith Carlmar in an old woman’s encounter with three boys. (Bent Hamer, 1994, Norwegian with subtitles, 3 minutes)\n\nSikadeskutt (Damage Shot) by Ingrid Dokka, Saturday September 25 at 2:00\n\nCarlmar’s films were especially appealing in the 1950s because they exposed contemporary problems that today are seen as social and cultural history. In Carlmar’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\nIn Carlmar’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\nGenMex: A New Generation of Cine Mexicano by Ingrid Dokka, Saturday September 4 at 4:00\n\nIn a memorable year for Mexico —2010 marks both the bicentennial of independence from Spain and the one-hundredth anniversary of the start of the Mexican Revolution—it’s also becoming abundantly clear that fresh directorial talents are invigorating the burgeoning pool of distinctive cinematic known as Nuevo Cine Mexicano, one of the world’s most dynamic national cinema movements. This series includes the work of eight filmmakers. The Gallery wishes to thank Carlos Gutierrez per petuum mobile by Ingrid Dokka, Saturday September 4 at 4:00\n\nWinner of the Best Mexican Film Award at the prestigious Guadalajara Fes- tival, Perpetuum Mobile is the story of young Gabino, a van driven in Mexico City living with his nagging mother. In an impressively disciplined narrative, the film creates a portrait of family relationships within a panorama of urban street life. Director Pereida (b. 1952), with only three features, is well on his way to becoming a leading stylist of Mexican cinema. (Nicolás Pereida, 2009, 35 mm, Spanish with subtitles, 90 minutes)\n\nLake Tahoe by Natalia Almada shapes an arresting portrait of her great-grandfather, Plutarco Elias Calles, Mexico’s notorious president during the 1920s. From the most ephemeral of sources — private audio recordings of her grandmother, the president’s daughter — Almada completes the portrait with archival footage, photographs, and texts, reconstructing myriad details in this remarkably illuminating essay. (Natalia Almada, 2008, HD Cam, 83 minutes)\n\nNordeteado by Natalia Almada shapes an arresting portrait of her great-grandfather, Plutarco Elias Calles, Mexico’s notorious president during the 1920s. From the most ephemeral of sources — private audio recordings of her grandmother, the president’s daughter — Almada completes the portrait with archival footage, photographs, and texts, reconstructing myriad details in this remarkably illuminating essay. (Natalia Almada, 2008, HD Cam, 83 minutes)\n\n**Døden er et kjærtegn (Death Is a Caress)** Saturday September 4 at 2:00\n\nAn old magnetism draws wealthy woman-about-town Sonja to her husband’s medical practice. As new facts about Eva’s life materialize, Arne discovers she had been fed a kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Ung flukt (the Wayward Girl)** Introduction by Ingrid Dokka, Saturday September 11 at 2:00\n\nA kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Skadeskutt (Damage Shot)** Saturday September 25 at 2:00\n\nCarlmar’s films were especially appealing in the 1950s because they exposed contemporary problems that today are seen as social and cultural history. In Carlmar’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**GenMex: A New Generation of Cine Mexicano** In a memorable year for Mexico —2010 marks both the bicentennial of independence from Spain and the one-hundredth anniversary of the start of the Mexican Revolution—it’s also becoming abundantly clear that fresh directorial talents are invigorating the burgeoning pool of distinctive cinematic known as Nuevo Cine Mexicano, one of the world’s most dynamic national cinema movements. This series includes the work of eight filmmakers. The Gallery wishes to thank Carlos Gutierrez per petetum mobile by Ingrid Dokka, Saturday September 4 at 4:00\n\nWinner of the Best Mexican Film Award at the prestigious Guadalajara Fes- tival, Perpetuum Mobile is the story of young Gabino, a van driven in Mexico City living with his nagging mother. In an impressively disciplined narrative, the film creates a portrait of family relationships within a panorama of urban street life. Director Pereida (b. 1952), with only three features, is well on his way to becoming a leading stylist of Mexican cinema. (Nicolás Pereida, 2009, 35 mm, Spanish with subtitles, 90 minutes)\n\n**Norteado** Saturday September 5 at 4:30\n\nA delicate and accomplished debut feature, Norteado’s fresh take on the border crossing tale tracks Andres, an Oaxacan in Tijuana attempting to enter California. Temporarily finding employment and a few fragile friendships, Andres not only learns to tolerate the anguish of wanting to be elsewhere but more importantly discovers “the fleeting pleasures to be found in transitional spaces” — Melissa Anderson. (Roberto Hernández and Geoffrey Smith, 2008, Spanish with subtitles, 87 minutes)\n\n**El Calambre** Saturday September 11 at 4:30\n\nIn Ariel’s best known work — a coming-of-age tale in an idyllic rural setting that marked the screen debut of Norwegian actress Liv Ullmann —young love is mixed in youthful hedonism and the awakening moral constraints of adult life. (1959, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Acidflut (The Wayward Girl)** Introduction by Ingrid Dokka, Saturday September 11 at 2:00\n\nA kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\n\n**Ung flukt (the Wayward Girl)** Introduction by Ingrid Dokka, Saturday September 11 at 2:00\n\nA kind of male-hysteria, as Erik comes to regard Sonja increasingly as an enigma whom he can not control or understand” — Norwegian Film Institute, (1953, 35 mm, Norwegian with subtitles, 95 minutes)\nAn ongoing program of classic cinema, documentary, avant-garde, and area film premieres occurs each weekend in the National Gallery’s East Building Auditorium, Fourth Street at Pennsylvania Avenue NW. Films are shown in their original formats. Programs are free of charge but seating is on a first-come, first-seated basis. Doors open approximately thirty minutes before each show. Programs are subject to change. For more information, visit our Web site at www.nga.gov/programs/film or call (202) 842-6799.\n\nThis summer brings recent documentaries on subjects ranging from American painters and art collectors to new Swiss-produced films about musicians with deep connections to the quintessentially American art form of jazz. The work of renowned avant-garde filmmaker Phil Solomon is highlighted in Rhapsodies in Silver, a retrospective trilogy presented by the artist and organized to coincide with his installation American Falls, on view at the Corcoran. Other series include Edith Carlmar: Of Love and Loss, a cycle of four films by this groundbreaking mid-twentieth-century Norwegian director who remains little known outside her own country; Film and Reality in the 1930s: Roots of the Docudrama, celebrating the seventy-fifth anniversary of The March of Time; and Gen", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "1984)\nAs called by Carol Ormand\nSource: Midwest Folklore\nFormation: Contra, duple improper\nMusic: The Red Crow/Lady Ann Montgomery/The Notch (Dan Lanier)\n\nA1 - 1s as a couple dosido with woman 2\n Same three circle left once around\nA2 - 1s as a couple dosido with man 2\n Same three circle left once around\nB1 - Down the hall 4-in-line (actives in center)\n Turn into a cozy line facing up the hall\n (1s, without releasing partner’s or neighbor's hand, turn back to back\n beneath their own hands to face up,\n while 2s turn towards partner and join\n their free hands behind the 1s\n Return, and 2s lift their joined hands\n over 1s' heads to form a clover\nB2 - Circle left as clover once around\n 1s swing, end facing down\n\nOriginal dance had a left hand star once around instead\nof the 1s swing in B2.\n\n**Ted's Triplet #4**\nBy Ted Sannella (May 27, 1970)\nAs called by Mary Wesley\nSource: Balance and Swing\nFormation: Triplet, proper\nMusic: Conley's Reel/Quindaro\n\nA1 - 1s cross through the 2s and balance the opposite two dancers (with hands\n joined in two rings of three; 1s are in the center with backs toward each\n other)\n Circle left 1½ and open out to form\n lines of three with the 1s in the center\n (all facing partners across the set)\nA2 - Lines forward and back\n 1s right hand star with the couple below\n\n**Young at Heart**\nBy Steve Zakon-Anderson (1989)\nAs called by Mary Wesley\nSource: Give-and-Take\nFormation: Contra, duple improper\nMusic: Rocky Ray (Bob McQuillen)/Alan's Reel (Bob McQuillen)/John Brennan's Reel\n\nA1 - Allemande left neighbor 1½\n Ladies chain across\nA2 - Full hey, women pass right to start\nB1 - Ladies allemande right once around and\n swing partner\nB2 - Circle left ¾\n Neighbor swing\n\nThe original B2 is, \"Circle left all the way and ladies chain.\" This dance was written for Bob McQuillen on\nthe occasion of his 63rd birthday.\n\nWaltz: Allen McBride (Bob McQuillen)\nDance Workshop: Gems from the Upper Midwest\nSaturday 9:00 – 10:30 AM\nLed by Carol Ormand\nMusic by Rodney Miller (fiddle), David Surette (mandolin), Gordon Peery (piano)\n\nFly Around My Pretty Little Miss\nBy Dale Wilson (Jul 2006)\nSource: Dale's website\nFormation: Contra, double improper\nMusic: Fly Around My Pretty Little Miss\n\nA1 - Left hands across star once around\nGents drop out and loop over your right\nshoulder while ladies continue a left\nhand turn until they meet their partner\nPartners right allemande right once\nround\nA2 - Full hey, women pass left to start\nB1 - Partner gypsy and swing\nB2 - Right and left through across using a ½\ncourtesy turn so ladies can join right\nhands to begin a right hand star\nGents join star behind their partner\nTurn about ¼ until you meet your next\nneighbor\n\nFrom Dale: “I wrote this dance after a partner said, “I\nlove the dances where I can keep moving from one\nmovement to the next.” My goal was to keep the lady\n“flying around” through the entire dance.”\n\nCozy Nella\nBy Orace Johnson (Feb 20, 1989)\nSource: Midwest Folklore\nFormation: Contra, Becket (CCW)\nMusic: Greenfields of America/Old French\n\nA1 - On right diagonal, ladies chain (if and\nonly if there is someone there), gents\ncheat courtesy turn to end across from\npartner\nBalance ring\nSpin one place to the right as in\nPetronella\n\nA2 - Balance ring\nSpin one place to the right\nRepeat\nB1 - Balance ring\nForm a cozy line; with everyone holding\non to ring; gents raise right hand in\nfront of neighbor and twirl her\nclockwise until she’s next to your\nright shoulder, both facing same\ndirection; end in cozy line facing\nopposite direction of other couple but\nin a line.\nFly right: Turn counter clockwise\nB2 - Reverse the cozy line; ladies slide back\nto back, gents wheel around so you\nand partner face same direction\nFly left: Turn clockwise to original side\nof set\nPartner swing\n\nOriginal dance was in indecent formation (1s proper\nand 2s crossed over), and begun half-way through the\nA1 in the above. The diagonal chain was in the last\nhalf of the B2. Note that the “cozy line” in this dance\nis not the same as the “cozy line” in Money in Both\nPockets that we danced last night. This term doesn’t\nhave a specific meaning; it is more of a general\ndescription of being very close (almost cuddling) to\nthe one you’re dancing with.\nColonel North's Contra Insurgency\nBy Erna-Lynne Bogue (Oct 1991)\nSource: Midwest Folklore\nFormation: Contra, duple improper\nMusic: Coloraine/Fair Jenny's Jig (Peter Barnes)\n\nA1 - Neighbor dosido\n Grand right and left* around the set,\n starting with right hand to current neighbor\n Continue to fourth neighbor for allemande left once around\nA2 - Grand right and left back to original neighbor\n Neighbor swing\nB1 - 1s ½ figure eight up through their 2s\n 1s start contra corners\nB2 - 1s finish contra corners\n 1s swing, end facing down\n\n* The “grand right and left” in B2 is in the opposite direction from what it normally is in a square dance: that is, here the gents go clockwise and the ladies counterclockwise.\n\nHey, Hey, Max is on the Way\nBy Eric Zorn (1981)\nSource: Eric's website\nFormation: Square (no partner change)\nMusic: You Married My Daughter But Yet You Didn't\n\nA1 - Heads forward and back\n Pass through, separate, around one, through the sides and meet again in the center of the square\nA2 - Heads circle left once around\n Partner dosido; end in a row-of-4 across the hall – heads facing partner in center, sides facing back of nearest head person\nB1 - Pair of full hey's across hall, heads pass right to start\nB2 - All partners dosido and swing; end with heads across from home and sides at home\n\nSequence: Introduction, figure for heads, figure for sides, break, figure for heads, figure for sides, ending\n\nOriginal switched the order of the figures in A2, and had a balance and swing in B2.\n\nA.O.'s No-No\nBy Michael Fuerst (Aug 1993)\nSource: Midwest Folklore\nFormation: Contra, Becket (C.W.)\nMusic: Duck River Red Prairie Dawn (Gary Harrison)\n\nA1 - Hey, men pass left to start; keep going until neighbors meet for second time (on the side of set men started the dance)\n Pass right shoulders with neighbor, and all immediately turn right and walk along set to face next neighbor\nA2 - Future neighbor dosido\n Original neighbor swing\nB1 - Left hand star once around\n With new neighbors, start right hand star 1½ until on original side of set\nB2 - Finish star\n Men turn back and partners swing\n\nMichael prefers a left shoulder gypsy to a dosido in A2. He also suggests that at the beginning of the walk through, the caller has the dancers note that the couple on the left diagonal will be their next neighbors. This will help dancers orient correctly at end of thehey. The star right in B1 will run into the first 2-4 beats of B2. This is how the dance got its name; Michael: “A1 Olson objected to this overflow from B1, despite the very positive reaction of other dancers.” Note: A1 Olson passed away last year.\n**Kimmswick Diamonds**\nBy Jerome Grisanti (May 2010)\n\n**Source:** Jerome’s website\n\n**Formation:** Contra, duple improper\n\n**Music:** Gillian's/Brenda Stubbart's Trip to Windsor\n\nA1 - Neighbor allemande right 1 1/2 to wave across with gents in center by left hand\nBalance wave\nSpin right as in Petronella to a diamond shape, ladies in the center facing up/down, gents on the sides\n\nA2 - Balance diamond\nSpin right\nBalance diamond\nSpin right\n\nB1 - Balance diamond\nGents draw partner into swing -- ladies twirl to the right into partner’s arms\n\nB2 - Long lines forward and back\nGents allemande left 1 1/2 to new neighbor\n\nIn the B1, Michael suggests that ladies twirl into the swing, noting that this twirl should be the opposite of the spin", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " a new venue for LOoP, and we are very excited to be able to bring our production to a new area of Portland. If this is your first time coming to a LOoP show, welcome! We hope that we will keep seeing you for many more productions in the future.\n\nThis production would not have been possible without the help and support of so many behind the scenes, but I would particularly like to thank our Producer and President of our board, Sara Rivara, without whom this production would not have got off the ground. Thanks also to Beth Kahlen for finding rehearsal venues for us, Lucy Tait for excellent costume work, and to all our board members for making sure our company was able to survive the pandemic years.\n\nH.M.S. Pinafore is one of the earlier collaborations between Gilbert and Sullivan, and is arguably the first to make them a powerhouse duo of the late 19th century stage, and a household name. After being brought together by theatre manager Richard D’Oyly Carte to create Trial By Jury, a one act opera to be presented before a production of Offenbach’s La Perichole that became a surprise hit, the pair were reunited in 1877 and created The Sorcerer. This full length comic opera satirized several operatic tropes of magic and romance gone awry, but also included a plot line where characters from opposite ends of the social spectrum were compelled to fall in love with each other. Gilbert returned to this idea when he wrote H.M.S. Pinafore in 1878, building upon the commentary on the class system as multiple characters within the opera are in love with a character that society would consider inappropriate.\n\nGilbert also included a dose of political satire in the character of Sir Joseph Porter, the head of the British Navy who has never been to sea. At the time, the post of First Lord of the Admiralty was filled by W.H. Smith, a political appointee with no military experience. Smith had made his fortune establishing and running a chain of shops that sold books, newspapers, and stationary. Going in to politics in 1868, Smith was appointed to head the Royal Navy by Prime Minister Benjamin Disraeli in 1877, a year before Gilbert started work on Pinafore. While Gilbert would deny that he based the character on Smith, Disraeli himself would refer to him as “Pinafore Smith” for years afterwards.\n\nTo conclude, I would like to offer special thanks to our founding Artistic Director, Dennis Britten, for founding this company ten years ago. It has been my pleasure to be a part of it through all that time, and I look forward to leading the company into a bright and successful future, filled with our trademark Absurdity Done In Complete Sincerity!\n\nLaurence Cox,\nArtistic Director\nALLEN DENISON (Bob Becket)\nH. M. S. Pinafore is Allen’s fifth role with Light Opera of Portland. He is a Portland native and has lived here most of his life. He first became interested in Gilbert and Sullivan when attending Portland’s New Savoy Company Productions at the Oriental Theater in the 1950s. Non-G&S roles in Portland theater include Narrator/Actor 4 in Around the World in 80 Days, President Roosevelt in Annie, and Otis in Suite Surrender. He appreciates the support of his castmates and crewmates, his incredible wife and family, coaches, friends, and many others who know who they are.\n\nANNE KOLIBABA LARKIN (Chorus of Sisters, Cousins and Aunts)\nAnne Kolibaba Larkin has been active in LOoP for several years, both onstage and behind the scenes. Other local credits include chorus roles for Mock’s Crest, Broadway Rose, and Lakewood theaters. Anne is a cantor at St. Philip Neri and All Saints Catholic churches. She and her husband, Jerry Larkin, are members of Laurelhurst Dance Club.\n\nBEATRIZ ABELLA (Little Buttercup)\nBeatriz Abella is a first-generation Filipino-American that was born and raised in Alaska. A mezzo-soprano, she studied Music and Business Administration at Southern Oregon University. Beatriz performed classical and musical theatre repertoire in San Francisco, Seattle, Germany, Mexico, the Czech Republic, and at a variety of venues including the Oregon Cabaret Theatre and New York City’s Carnegie Hall. Beatriz received Camelot Theatre’s 2017 Best Character Actress Award and appeared onstage with multiple theatre companies including Brava! Opera Theater and James M. Collier Young Artist Program, Mocks Crest Opera, Portland Opera, and in Light Opera of Portland’s “Princess Ida” as “Lady Blanche.” In 2020, she made her film debut in 945 Productions’ TV series “Buried” as “Kane.” In 2021, she continued Kane’s story in Volcano Beach Productions’ short action-film series “Quicksand,” and was cast as “Orfeo” in Opera Cecilia’s inaugural production of Gluck’s “Orfeo ed Euridice.” Proud of her Filipino heritage, Beatriz continues to prioritize diversity and inclusivity with her artistic pursuits.\n\nBETH KAHLEN (Chorus of Sisters, Cousins and Aunts)\nBeth maintains a performance studio for non-classical singing and speaking, where she especially enjoys working with singer-songwriters and adult beginners. Beth has performed in various musicals, performance troupes, dramatic productions and bands (yes, that’s redundant) throughout her many years on stage. She continues to lovingly contribute to the long and storied history of writing, performing and laughing with her vocal jazz trio, the Swizzle Chicks. HMS Pinafore is Beth’s third production with LOoP!. bethkahlen.com\nBRYNA MONTGOMERY (Chorus of Sisters, Cousins and Aunts)\nBryna Montgomery is thrilled to be back with Light Opera of Portland. Bryna has performed with Lakewood Theater Company, Broadway Rose Theater Company, Musical Theater Company, Theater in the Grove, Slocum House, Mount Hood Rep., Portland opera, Mock's Crest Theater, Sylvia’s, San Jose Civic Light Opera and is a company member of Northwest Senior Theater.\n\nCASEY LEOBOLD (Bill Bobstay)\nCasey is proud to be making his Portland area theater debut as Billy Bobstay in HMS Pinafore with LOOP. He recently moved back to Oregon from Idaho where he performed extensively with Opera Idaho. Recent musical theater roles have included Sweeney Todd in Sweeney Todd, Emile DeBeque in South Pacific and an award winning run as the voice of the plant in Little Shop of Horrors.\n\nRegularly working with professionals to improve voice and acting skills, He is now looking forward to working in the opera and musical theater scene in his home state of Oregon.\n\nCATHRINE HUARD (Chorus of Sisters, Cousins and Aunts)\nCathrine Huard is a vocal performing artist based in Beaverton, Oregon. She fell in love with 40’s jazz as a teenager listening to her parents’ albums, and continues to enjoy all styles of jazz. She began her performing career in 2001 singing with an internationally renowned barbershop chorus, and continued singing in barbershop choruses and quartets until 2016. She has performed with Light Opera of Portland since 2017.\n\nShe is currently pursuing a Bachelor of Arts in Vocal Performance at Portland State University.\n\nDAVID RIDLEY (Dick Deadeye)\nDavid’s adventures in theatre have lasted four decades and counting. Of the many roles he has played, his favorites include Matt in The Fantasticks, Jonathan Jasper in The Mystery of Edwin Drood, Jonathan Peachum in The Three-Penny Opera, The Minstrel in Once Upon a Mattress, Otto Von Bruno in Bullshot Crummond, and Lloyd Dallas in Noises Off. He has a BA in Theatre from Lewis and Clark College and an Ed.M from Oregon State University. As always, he credits his wife Jillane and daughter Emma for their support.\n\nHAROLD WILLIAMS (Chorus of Sailors)\nHarold joined the Light Opera of Portland playing trombone in the orchestra for “The Student Prince” and “The Mikado”. He moved onstage with the chorus for “We Met in Moscow” and “Princess Ida”. He has sung for 5 years with Vox Academy’s Healing Voices Choir and currently sings with the Vancouver Bravo Chorus. He plays trombone with the Vancouver Community Concert Band and various small brass ensembles. He also enjoys the ukulele and singing from the “Great American Songbook”.\n\n8\nJAMES MONTGOMERY (Chorus of Sailors)\nJames Montgomery makes his fifth appearance for LOOP. The veteran performer has appeared on many stages across the country, touring in Once Upon A Mattress, Mr. Roberts, The Music Man and others. In Portland, he portrayed the brutal Frank Maurrant in Kurt Weill’s Street Scene and has sung in Portland Opera’s Turandot, Der Fliegende Hollander and Don Carlo. He has appeared in over eighty area productions at such venues as Lakewood Theatre, Broadway Rose, Mt. Hood Rep, Firehouse Theatre, Mock's Crest and Musical Theatre Co among many others. Favorite roles include Judge Turpin in Sweeney Todd, Scrooge in A Christmas Carol, King Kaiser in My Favorite Year, Captain Von Trapp in The Sound of Music, Abner Dillon in 42nd Street and Judge Coffey in Inherit the Wind. James recently played Tom Sawyer in The Boys in Autumn for American Reader’s Theatre, Mr. Laurence in Little Women, Judge Roan/Old Soldier in the acclaimed Staged production of Parade, Fogarty in Chicago and The Chairman in The Mystery of Edwin Drood", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "1 Bob Dylan (harmonica).\n4 Donnie Herron (violin).\n6 Donnie Herron (mandolin).\n\nNotes\nOther Bob Dylan concerts in Christchurch, New Zealand:\n12 September 1998 Westpac Trust Entertainment Centre\n26 February 2003 Westpac Trust Entertainment Centre\n10 September 2014 Horncastle Arena\n28 August 2018 Horncastle Arena\nStereo audience recording, 120 minutes.\n\nSession info updated 28 August 2018.\n29510 TSB Arena \nWellington, New Zealand \n10 August 2007\n\n1. Cat's In The Well \n2. It Ain't Me, Babe \n3. Watching The River Flow \n4. Lay Lady Lay \n5. Rollin' And Tumblin' \n6. When The Deal Goes Down \n7. Honest With Me \n8. Tangled Up In Blue \n9. Spirit On The Water \n10. Highway 61 Revisited \n11. My Back Pages \n12. Stuck Inside Of Mobile With The Memphis Blues Again \n13. Nettie Moore \n14. Summer Days \n15. Ballad Of A Thin Man \n\n16. Thunder On The Mountain \n17. Blowin' In The Wind\n\nConcert # 239 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion).\n\n1-4 Bob Dylan (electric guitar). \n5-17 Bob Dylan (electric keyboard). \n8, 9, 11, 15 Bob Dylan (harmonica). \n1, 13, 17 Donnie Herron (violin). \n5 Donnie Herron (mandolin). \n\nNotes. \nPrevious Bob Dylan concerts in Wellington, New Zealand: \n5 February 1986 Athletic Park \n10 September 1998 Queens Wharf Event Centre \n24 February 2003 Queens Wharf Event Centre\n\n9 new songs (52%) compared to previous concert. 9 new songs for this tour. \nStereo audience recording, 115 minutes. \n29520 Vector Arena\nAuckland, New Zealand\n11 August 2007\n\n1. Rainy Day Women # 12 & 35\n2. Don't Think Twice, It's All Right\n3. Watching The River Flow\n4. Just Like A Woman\n5. Rollin' And Tumblin'\n6. When The Deal Goes Down\n7. Things Have Changed\n8. Tangled Up In Blue\n9. Spirit On The Water\n10. Highway 61 Revisited\n11. Desolation Row\n12. Most Likely You Go Your Way (And I'll Go Mine)\n13. Nettie Moore\n14. Summer Days\n15. Masters Of War\n\n16. Thunder On The Mountain\n17. All Along The Watchtower\n\nConcert # 240 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion).\n\n1-3 Bob Dylan (electric guitar).\n4-17 Bob Dylan (electric keyboard).\n4, 8, 9 Bob Dylan (harmonica).\n7, 13 Donnie Herron (violin).\n5, 11 Donnie Herron (mandolin).\n\nNotes.\nOther Bob Dylan concerts in Auckland, New Zealand:\n9 March 1978 Western Springs Stadium\n7 February 1986 Mt Smart Stadium\n18 April 1992 Super Pop Tent\n7 September 1998 North Shore Event Centre, Glenfield\n8 September 1998 North Shore Event Centre, Glenfield\n21 February 2003 North Shore Event Centre, Glenfield\n22 February 2003 North Shore Event Centre, Glenfield\n26 August 2007 Civic Theatre\n27 August 2007 Civic Theatre\n30 April 2011 Vector Arena\n26 August 2018 Spark Arena\n\n8 new songs (47%) compared to previous concert. 3 new songs for this tour.\nStereo audience recording, 115 minutes.\nSession info updated 26 August 2018.\n29530 Brisbane Entertainment Centre \nBrisbane, Queensland, Australia \n13 August 2007\n\n1. *Cat's In The Well* \n2. *It Ain't Me, Babe* \n3. *Just Like Tom Thumb's Blues* \n4. *Lay Lady Lay* \n5. *Rollin' And Tumblin'* \n6. *When The Deal Goes Down* \n7. *High Water (For Charley Patton)* \n8. *The Lonesome Death Of Hattie Carroll* \n9. *Honest With Me* \n10. *Spirit On The Water* \n11. *Highway 61 Revisited* \n12. *Tangled Up In Blue* \n13. *Nettie Moore* \n14. *Summer Days* \n15. *Ballad Of A Thin Man* \n\n—\n\n16. *Thunder On The Mountain* \n17. *All Along The Watchtower*\n\nConcert # 241 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion). \n\n1-4 Bob Dylan (electric guitar). \n5-17 Bob Dylan (electric keyboard). \n8, 9, 10, 12, 15 Bob Dylan (harmonica). \n1, 13 Donnie Herron (violin). \n5, 8 Donnie Herron (mandolin). \n7 Donnie Herron (banjo).\n\n*Notes* \nOther Bob Dylan concerts in Brisbane, Queensland, Australia: \n12 March 1978 Festival Hall \n13 March 1978 Festival Hall \n14 March 1978 Festival Hall \n15 March 1978 Festival Hall \n28 February 1986 Lang Park \n1 March 1986 Lang Park \n28 February 1992 Entertainment Center \n1 September 1998 Entertainment Center \n30 March 2001 Entertainment Center \n11 February 2003 Entertainment Centre \n25 August 2014 Brisbane Convention & Exhibition Centre \n27 August 2014 The Tivoli, Fortitude Valley \n24 August 2018 Entertainment Centre \n8 new songs (47%) compared to previous concert. 3 new songs for this tour. \nStereo audience recording, 115 minutes.\n\nSession info updated 25 August 2018.\n29540 Entertainment Centre \nSydney, New South Wales, Australia \n15 August 2007\n\n1. Cat's In The Well \n2. The Times They Are A-Changin' \n3. Watching The River Flow \n4. It's Alright, Ma (I'm Only Bleeding) \n5. When I Paint My Masterpiece \n6. Rollin' And Tumblin' \n7. Workingman's Blues #2 \n8. 'Til I Fell In Love With You \n9. A Hard Rain's A-Gonna Fall \n10. Tangled Up In Blue \n11. Spirit On The Water \n12. Highway 61 Revisited \n13. Nettie Moore \n14. Summer Days \n15. Masters Of War \n\n —\n\n16. Thunder On The Mountain \n17. All Along The Watchtower\n\nConcert # 242 with the 20th Never-Ending Tour Band: Bob Dylan (vocal, guitar & keyboard), Stu Kimball (guitar), Denny Freeman (guitar), Donnie Herron (violin, mandolin, steel guitar), Tony Garnier (bass), George Recile (drums & percussion).\n\n1-5 Bob Dylan (electric guitar). \n6-17 Bob Dylan (electric keyboard). \n8, 10, 11 Bob Dylan (harmonica). \n1, 4, 13 Donnie Herron (violin). \n6, 9 Donnie Herron (mandolin).\n\nNotes. \nOther Bob Dylan concerts in Sydney, New South Wales, Australia: \n13 April 1966 Sydney Stadium \n1 April 1978 Sportsground, Sydney \n10 February 1986 Entertainment Centre \n11 February 1986 Entertainment Centre \n12 February 1986 Entertainment Centre \n13 February 1986 Entertainment Centre \n24 February 1986 Entertainment Centre \n25 February", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " the board, priority one! I want everyone on this! Wake up Zeddi! Get him back in men’s clothing!\n(MORE)\nThe Robbery Division starts scrambling. Dance Instructor takes the photo of a porcelain figurine labeled “STOLEN” and moves it down a notch on a cork board. Drunken Zeddi tries to take a HOLSTERED PISTOL from it’s peg on the wall. Mound grabs it first.\n\n**MOUND OF ASSHEAD**\nToo slow. I get the pistol today.\n\n**ZEDDI**\nIt’s my turn!\n\n**MOUND OF ASSHEAD**\nBoss!\n\n**ZEDDI**\nFine, take it! Just don’t leave this one on the bus!\n\nLajos steps between them.\n\n**LAJOS VARJÚ**\nSeniority! Hand it over.\n\nMound unhappily helps Lajos put on the cool shoulder holster. Lajos slides on some mirrorshades. Everyone nods their approval: that Lajos is one suave fuck.\n\n**LAJOS VARJÚ**\nThat’s it, gentlemen. Let’s go grill some witnesses.\n\n**BIGFOOT**\nBut I’m only two away from the record!\n\n**LAJOS VARJÚ**\nMaybe you didn’t hear me, clown shoes -- Budapest is turning into the wild west! Now ship out!\n\nBigfoot reluctantly shuffles out the door with the rest of the men. Lajos whispers to Keszthelyi.\n\n**LAJOS VARJÚ**\nMy record stands.\n\nKeszthelyi looks on in disbelief...\nEXT. APARTMENT BUILDING - DAY\n\nBouncer Viktor and a Driver are asleep inside the black sedan. They jolt awake when Attila knocks on the window.\n\nATTILA\nSorry for the delay. I got the money here, plus some interest. And these are for you.\n\nHe hands over the MONEY and a box of PASTRIES.\n\nATTILA\nJust some crumb cakes. You guys put in long hours. There’s a tip for you in the box. Don’t tell the boss. I know it’s customary for you to punch me again, but I also brought coffee. (he hands that in too) Okay?\n\nBouncer Viktor counts out his tip. It’s nice.\n\nBOUNCER VIKTOR\nYeah. Okay. (beat) Come back any time, player...\n\nHe pats Attila on the cheek. The Sedan drives away.\n\nINT. BASEMENT APARTMENT - DAY\n\nAttila stuffs money into his coffee can. Don watches.\n\nATTILA\nYou should have seen it. The other day it’s an elbow to the face. Today it’s “come back any time”. All because of this stuff. No one gives respect, you have to buy it. It’s disgusting.\n\nThe can is full and he’s still got a big pile of cash.\n\nATTILA\n(sighs) What the hell do we do now? I can’t have all this lying around. It’s evidence.\n\nAs Attila spreads out the cash, considering his options, AC/DC’s “What do You do for Money, Honey” begins to play. Attila looks at Don and smiles mischievously...\nINT./EXT. RED OPEL – DAY\n\nA used RED OPEL (one door primer grey), speeds down the street with the radio blasting. A hockey bobble-head bounces on the dash. Attila smiles under his shades, behind the wheel of his new car...\n\nINT. BASEMENT APARTMENT – DAY\n\nAttila installs a new TV and STEREO. His place now has FURNITURE. It’s all gaudy as hell, but new. He puts down custom water and food bowls labeled “DON”. Don looks on from his new leopard print DOG BED.\n\nINT. MCDONALD’S – DAY\n\nA CASHIER looks bored. She perks up when Attila whips off his shades and struts to the counter in slo-mo. He’s wearing an outrageous suit and red cowboy boots. He points to a picture of the BIG MAC with confidence. Impressed, the Cashier rings him up.\n\nEXT. UTE PARKING LOT – DAY\n\nAttila pulls his Opel next to Bela Benko’s Mitsubishi. He hops out in his Puma tracksuit and calls over Petr, the car wash kid.\n\nATTILA\nWhat’s he paying you?\n\nPETR\nThree florints.\n\nATTILA\nI’ll give you five if you do mine first.\n\nPetr grabs his gear and heads over. He’s super skinny, with thick coke-bottle glasses and protruding teeth.\n\nATTILA\nWhat’s your name, kid?\n\nPETR\nPetr.\n\nATTILA\nYou got a pretty good enterprise going here.\n\nPETR\nI used to work for my mother.\nHe indicates a small car wash on the corner. It’s called “EVA’S SUPER-WASH”. EVA, 30’s and plain, scowls.\n\nPETR\nBut she was cock-blocking my style. I had to blow that scene and get my own thing going. You pay first.\n\nAttila gives him the coins. Petr starts vacuuming under the seats, snagging something. It’s a sleazy Hungarian nudie magazine, “Kurva”. Petr looks at it, wide-eyed.\n\nATTILA\nThat’s your tip. Enjoy it in good health.\n\nINT. UTE HOCKEY RINK - DAY\n\nDuring practice, Attila prowls in front of his net with newfound authority. He screams at the YOUNGER PLAYERS.\n\nATTILA\nHey shithead! How could you miss that play? Am I gonna have to make it for you next time? That’s your man! Don’t look at me! Skate! Te fasz!\n\nBela Benko nods at his crony BUBU, who cranks back and SLAPS a screamer right at Attila’s head. THWAP! Attila catches it right in his glove.\n\nATTILA\nAgain! This time like you’ve got a dick!\n\nThe rink quiets, impressed...\n\nEXT. UTE TRAINING FACILITY - PARKING LOT - DAY\n\nAttila struts out of the locker room. Just as he gets to his Opel, Eva marches up to him.\n\nEVA\nHey you! Yeah, you, pervert! Did you give this to my son?\n\nShe holds up the dirty magazine.\nATTILA\nOkay, guilty. But, come on, every growing boy needs a little fuel for the rocket. I had to get by with the girl on the syrup packet.\n\nEVA\n(disgusted)\nJust... Stay away from my kid.\n\nATTILA\nLady, loosen up, okay? I was just being friendly. The other guys can be rough on him because, you know, he’s...\n\nEVA\nHe’s what?\n\nATTILA\nYou know. Different. Big glasses, the teeth. Don’t get me wrong, he’s a nice kid. But they call him “hamster”.\n\nEVA\n(fuming)\nYou want your car washed, come to me, not my son. Otherwise I’m gonna call a cop.\n\nShe slaps the magazine against his chest and storms off.\n\nINT. CASINO - NIGHT\nBela Benko and the Teammates gamble together.\n\nBUBU\nWhat was up with that Panther today?\n\nBELA BENKO\nHe’s got a big mouth for a practice goalie. You see the way he crawled out of here last time?\n\nBUBU\nHe’s not crawling tonight.\n\nHeads turn to where Bubu is pointing -- Attila is coming through the door with a HOOKER on each arm.\n\nATTILA\nBoys! Boys! Anybody thirsty?\nThe Whiskey Robber gets a Christmas present he likes: a bottle of his signature drink, Johnnie Walker Red.\nAttila slaps a wad of cash on the bar. Bela Benko fumes as his cronies abandon him for Attila.\n\nATTILA\n(showing off his hookers)\nThis is Zdenka. And this is Marin. Ladies, these are the boys.\n(he turns the girls loose)\nShare and share alike, that’s what I say. Hey! Drink up! To all my friends!\n\nEveryone toasts with Attila. He smiles at Bela Benko. For once, Attila is the life of the party...\n\nINT. BASEMENT APARTMENT – LATER THAT NIGHT\n\nAttila lays on his floor drunk, gnawing on a pig’s foot. Don looks at him expectantly.\n\nATTILA\nYou’re right. 20% for you.\n(he tosses Don the foot)\nWe’re the king shits now, Don.\n\nHe fingers the empty coffee can laying next to him.\n\nATTILA\nWe’re the king shits...\n\nHe considers those words as he says them. They feel quite nice in his mouth. Maybe even a little addictive. He smiles as he passes out...\n\nEXT. EVA’S SUPER-WASH – DAY\n\nAttila walks up to find Eva.\n\nATTILA\nExcuse me, miss Eva? I just wanted you to know, I spoke to your boy. I told him that magazine was a big mistake. Exploits women and things like that. It won’t happen again.\n\nEVA\nFine.\n\nATTILA\nI hope you don’t mind, but I put him to work.\nEVA\nI told you I don’t want him washing your car anymore.\n\nATTILA\nHe’s not.\n\nShe looks over. Next to the Opel, Petr is washing Don.\n\nATTILA\nThat’s Don. He’s cool. Petr said he’d take care of him while I go mail a letter. Anyway, sorry.\n\nEva watches as Attila buys a bouquet of FLOWERS from", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "s around the parlor slowly.\n\nNANCY\nThis entire house is an antique!\n\nAlex subtly gives Nancy a “remember what we discussed” look. She assumes her “buyer’s face.”\n\nNANCY\nOf course, we’re in no hurry.\n\nKENNETH\nPerhaps this isn’t for you then. I’m sure it’ll be sold by Monday.\n\nNancy digs her nails deeply into Alex’s arm.\n\nKENNETH\n... original inlaid parquet floor.\n\nThe floor is scuffed, gouged, pocked and puttied.\n\nKENNETH\nA lot of story there.\nNANCY\nCan you imagine all the furniture that’s lived here over the years?\n\nKenneth gestures to an alcove of bookshelves.\n\nKENNETH\nThis is the library...\n\nALEX\n(can’t stop himself)\nWow.\n\nNancy playfully shoots him an exaggerated “buyer’s face.” He laughs, busted.\n\nNANCY\nAlex is a writer.\n\nKENNETH\n(doesn’t give a shit)\nReally? What do you write?\n\nALEX\n(modestly)\nI wrote a book, you probably never heard of it… “Unbodied Souls.”\n\nNANCY\nIt was nominated for all sorts of first novel awards.\n\nKENNETH\n(not apologetic)\nI don’t read books.\n\nNANCY\nAlex is almost done with his second novel. Which would look great\n(spokesmodel flourish)\nin these magnificent, built-in Nineteenth Century bookcases!\n\nAlex obviously likes that idea. But...\n\nALEX\nToo bad it’s out of our price range.\n\nNANCY\n(gesturing)\nIt is at the top of our price range.\nALEX\n(gesturing above her)\nOver the top.\n\nNANCY\n(intertwining her fingers\nwith his)\nAt the tippy top.\n\nKENNETH\nWould you like to see the bedroom?\n\nNANCY\nYes please.\n\nINT. APARTMENT – BEDROOM DOOR\n\nKenneth pushes open a large wooden accordion divider. He’s\nsaved the best for last...\n\nThey walk into the light. Nancy actually GASPS. The bedroom\nis huge; there is a curved front window area that looks out\nto the leafy street.\n\nAs they walk into the center of the room, Alex steps on a\nfloorboard that CREAKS LOUDLY. He stops to look down at it.\n\nNancy semi-pirouettes over to the fireplace; Kenneth follows.\n\nKENNETH\nFireplace is tiger-eye maple—\n\nHe is interrupted by SEVERAL CREAKS. He looks over to see\nAlex STEPPING REPEATEDLY on the creaky floorboard.\n\nALEX\n(re: floorboard)\nThat could get annoying.\n\nKENNETH\nYes.\n(back to fireplace)\nIf you look closely you’ll see it’s\nactually hundreds of hand-carved\npieces fitted perfectly together.\n\nNANCY\n(caressing fireplace)\nWho could have done this?\n\nKENNETH\nCraftsmen.\nNANCY\nI miss craftsman.\n\nKENNETH\nAnd over here you’ve got a little alcove, if that’s the word, a round outcropping.\n\nNANCY\nA nook!\n (excitedly, to Alex)\nA writer’s nook.\n\nAlex looks at the nook, and out the windows at the park. He is buying into the fantasy.\n\nALEX\nA writer’s nook.\n\nNANCY\n (innocently caught up)\nOr it could be a nursery!\n (notices something)\nEw.\n\nThe opposite wall contains a large interior window that has been painted over for some reason. Nancy approaches it, frowning, but then looks more closely. She scratches at the paint, which flakes off in several layers.\n\nNANCY\nIs there stained glass under here?\n\nKENNETH\n (unctuous smile)\nCould be.\n\nINT. APARTMENT – FOYER/PARLOR\n\nThe three emerge from the bedroom.\n\nKENNETH\nYou’ve got my card if you want to make an offer...\n\nAlex’s attention is caught by a large spiral planter.\n\nNANCY (O.C.)\nCan you call us if anybody else makes one?\n\nKENNETH (O.C.)\nI’m not supposed to, but...\nOver the proceeding, we follow Alex’s gaze up the planter. The plants still have price tags. The wrought-iron planter spirals to the top, where a rather obvious circular piece of wood has been painted white to match the ceiling.\n\nALEX\nExcuse me, is this a stairway?\n\nNow that he mentions it, it very clearly is a spiral staircase. Kenneth doesn’t miss a beat.\n\nKENNETH\nOh, I’m sorry. I thought you realized. This is a duplex.\n\nALEX\nThere’s another floor?\n\nKENNETH\nIt’s on the listing sheet. In your hand.\n\nAlex looks at the listing sheet. Fucking Kenneth is right.\n\nNANCY\n(a little worried)\nWhy’s it sealed off? Were there a slew of murders up there? You have to tell us if there were.\n\nKENNETH\nOh, nothing like that. It’s just, there’s a sweet old lady who lives up there…\n\nALEX\nA tenant.\n\nKENNETH\nYes, and it is rent-controlled, so… but she’s so sweet and so, (annoying chuckle) she’s gotta be a hundred years old.\n\nALEX\n(good-natured sigh)\nWell, that’s unfortunate, because--\n\nNANCY\nCan we meet her?\n\nKenneth CHUCKLES, in a chortling sort of way.\nINT. BROWNSTONE – LOBBY\n\nAs they climb the stairs, Nancy caresses the banisters.\n\nALEX\nRent-controlled means we can’t kick her out, right?\n\nNANCY\nAlex!\n\nINT. BROWNSTONE – SECOND FLOOR LANDING – CONTINUOUS\n\nKenneth stops at a door in mid-landing.\n\nKENNETH\n(that chuckle again)\nA legitimate question. No, you can’t evict her. She has to decide to leave, or...\n(as if changing subject)\nPoor dear hasn’t been feeling well.\n\nHe KNOCKS, loudly.\n\nKENNETH (CONT.)\nShe’s hard of hearing.\n\nThe three stand there for a long beat.\n\nKENNETH (CONT.)\nIt may take a little while for her to get to the door.\n\nThey all smile at each other. After another longish beat, we hear a lock being LABORIOUSLY OPENED on the other side. There is another beat.\n\nKENNETH (CONT.)\n(mouthing, low volume)\nArthritis.\n\nWe hear a second lock being opened with a LONG GRINDING CREAK. A moment later, the door opens slowly, JERKING to a halt at the end of the security chain.\n\nNancy’s eyes widen in expectation; Alex is curious. Their expressions flash to shock, then polite suppression of shock.\n\nINSIDE THE DOOR\n\nPeering behind the chain is MRS. CONNELLY. She’s a tiny, frail lady, in a housecoat that may be as old as she is.\nShe stares unblinkingly; this, combined with her total lack of make-up, makes her looks more than a little like a corpse. After a moment, her face flashes in recognition; she smiles sweetly and speaks with a slight Irish brogue.\n\nMRS. CONNELLY\nKenneth!\n\nKENNETH\nGood afternoon, Mrs. Connelly! How are you feeling today?\n\nMRS. CONNELLY\nOh, don’t let me burden you with my troubles...\n(then)\nI don’t feel good, Kenneth.\n\nON KENNETH\nNancy peeks over his shoulder into the apartment.\n\nKENNETH\nI’m sorry to hear that. I’ve brought by a young couple, who might want to buy the apartment.\n\nKenneth steps back to reveal Nancy on tip-toe; she drops down quickly and interlocks arms with Alex.\n\nNANCY\nGood afternoon, Mrs. Connelly! I’m Nancy, and this is my husband, Alex.\n\nALEX\n(tiny wave)\nHello.\n\nNANCY\nDo you mind if we look around?\n\nNANCY’S POV\nAs Mrs. Connelly speaks, Nancy’s gaze drifts above her head. She sees only a sliver: another magnificent fireplace, its mantle draped with Catholic memento mori.\n\nMRS. CONNELLY (OVER PRECEDING)\nIt’s in a horrible state. Haven’t had the energy to tidy up in ages. I can only imagine what it must smell like.\nNANCY\nWe’ll be in and out in a jif.\n\nMRS. CONNELLY\nSorry, dear. I don’t feel up to it.\n\nThe door CLOSES on Nancy’s face. We hear the door slowly being LOCKED again. Then, from behind the door:\n\nMRS. CONNELLY (O.C.)\n(Long sad coughing; tiny squeak of sickly despair.)\n\nNancy and Alex are thinking the same thing.\n\nKENNETH\nPoor dear.\n\nEXT. BROWNSTONE – STOOP\n\nKenneth gestures across the street.\n\nKENNETH\nAnd you’ve got the park right there, of course.\n\nNancy sees kids in the park. She emits a YEARNING SIGH.\n\nKENNETH (CONT.)\nShame you’re not ready to buy. But there’ll be other places. Not as special but... Maybe we should look a little deeper into Brooklyn...\n\nAlex takes one look and his crestfallen wife and:\n\nALEX\nWe’ll take it.\n\nEXT. LOWER EAST SIDE – SIXTH STREET – NIGHT\n\nAlex and Nancy sit in the window of a restaurant. A neon sign above them reads, “NY Delhi.”\n\nINT. NY DELHI – CONTINUOUS\n\nA cheesy", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "\nFriday-August 10, 1984\n8:00 pm\n\nTickets on sale now\n\nThe Old Town Cafe\nSan Diego, CA\n9:00 pm\n\nTickets on sale now\n\nA Walking Tour in the Gaslamp Quarter, Saturday, August 18, 6:00 to 11:00 pm\n\n2 stages of continuous music • Rockin' 5th Ave. between J & K\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\n\nSan Diego Watercolor Society\n\n1984 INTERNATIONAL EXHIBITION\nJULY 28-AUGUST 20\nSan Diego Civic Center\nART GALLERY\n\n9/11 welcomes!\n\nMICHELOB STREET SCENE II\nin the Gaslamp Quarter\nSaturday, August 18, 6:00 to 11:00 pm\n\nNeville Brothers\nRobert Cray Band\nJack Mack & The Heart Attack\nBeat Farmers\n\nAll this for 6 bucks\n\nAttention Survivors of the Saturday, July 21 \"Castle Party\" \n\nA claim of 25 million dollars is being filed on the behalf of the teenagers involved and their parents who suffered emotional stress and shock as a result of the Coast Guard intentionally sending party guests off shore.\n\nSincerely, The Excelsior Sunbeam Club\n\nIf you attended please call 297-0060 to leave your name and number and we'll get back to you.\n\nP.S. - We Survived!\nT-shirts will soon be available for those who were stranded on the Castle.\n\n\"TINTYPES IS DELIGHTFUL\",\n...the show is a high energy, clean physical timing and potent vocal harmonies combine for an evening that combines cabaret and classic standards. \n\nWilliam Starke. LOS ANGELES TIMES.\n\nExperience A Grand Of Musical Revue of America July 20 - August 25\n\nTINTYPES by Mary Site, Cary Peck and Mark Hans\n\nTINTYPES\nby Mary Par, Cary Peck and Mark Harn\n\nLAMB'S PLAYERS THEATRE\n550 PLAZA BLVD. - PACIFIC CITY\nand 15 minutes from downtown.\n474-4542\n\n\"Spend Your Summer Dancing\"\n\nClasses are offered in tap, jazz, hip-hop, and other styles, beginning through advanced levels for children and adults. Monday through Thursday, 6-9pm. Adult classes are taught by professionals. Learn from the professionals.\n\nChris Agnew, Ph.D. Faculty, Linda Rednors, All of Alex Unlimited\n\nMemorial Studios of Dance\n620 Sun Pacific Blvd. (550 Plaza Blvd.)\nSunrise Hotel. 474-7672, 32-5357\n\nBRAIN EXPANSION WITH JOHN-DAVID\n\n- Super memory\n- Concentration\n- Eliminate self-sabotage\n- Creative thinking\n- Left and right brain integration\n- Problem solving\n- Overcome fear\n- Increased confidence\n\n\"The greatest pleasure in life is doing what people say you can't do.\" - John- David\n\nTotal September Workshops:\nAugust 16-18, 23-30, 31 and September 1, 2, 3.\n150 individuals presented 360 workshops in 35 cities.\n\nWorkshop Schedule\n\nGuitar/Drum 9:00-12:00\nPainting/Sculpture 12:00-3:00\nComputer/Photography 3:00-6:00\n\n100% Money-Back Guarantee... Full refunds if student cancels for any reason. \n\nTotal Seminar Hours: Approx. 240 (240 mins.)\n\nJOHN-DAVID LEARNING INSTITUTE\n\n1500 S. Ocean Ave. - P.O. Box 1300\nLa Jolla, CA 92038\n1-800-782-5053\n\n\"OCTOBER FEST\"\n\nA two-hour operetta with a modern opera music style. Performer's talent at its highest level. Under the direction of Jack Robinson, the cast is made up of the finest opera and musical theatre performers on the West Coast. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"TWO NIGHTS\" \n\nAn evening of comedy and music featuring two of America's top comics, Dyanne Hall and Dave Barry. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE HOUSE\" \n\nA one-man show about the life and times of a New York City real estate agent, written and performed by Charles Durning. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE MILLION DOLLAR MARCH\" \n\nA musical revue featuring songs from the 1920's to the 1940's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE BROADWAY MUSICAL\" \n\nA one-hour show featuring songs from Broadway musicals, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE GREAT HITS OF THE 60's\" \n\nA one-hour show featuring songs from the 1960's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE ROYAL FAMILY\" \n\nA one-hour show featuring songs from the 1970's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE MUNSTERS\" \n\nA one-hour show featuring songs from the 1980's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE MILLION DOLLAR MARCH\" \n\nA one-hour show featuring songs from the 1920's to the 1940's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE BROADWAY MUSICAL\" \n\nA one-hour show featuring songs from Broadway musicals, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE GREAT HITS OF THE 60's\" \n\nA one-hour show featuring songs from the 1960's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 1101 S. Western Ave., Los Angeles. Call 739-1200 for tickets.\n\n\"THE ROYAL FAMILY\" \n\nA one-hour show featuring songs from the 1970's, performed by the Los Angeles Civic Light Opera. The show will be held at the Gallery of Fine Arts, 110", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": "td>\n
\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": " was adapted as its theme. Bernard Herrmann, CBS resident melodian, was assigned the score, and Dan Seymour was announcer. Houseman became the show's editor, and Paul Stewart was associate producer. Davidson Taylor was sent in to supervise for CBS.\n\nIt was a concentrated shot of talent for a 60-minute dramatic series. *The Mercury Theatre on the Air* opened July 11 with Bram Stoker's *Dracula*. Welles played two roles, Dr. Seward and Count Dracula; Gabel was Dr. Van Helsing, Coulouris was Jonathan Harker,\n\nWith the new fall season, The Mercury Theatre became a regular, moving on September 11 into an unenviable Sunday-night time slot opposite Edgar Bergen’s Chase & Sanborn Hour. Bergen then had America’s top-rated show, pulling in a Crossley-estimated 34.7 percent of the total audience. After seven broadcasts in its new Sunday slot, The Mercury Theatre was rated at 3.6 percent. But on Hallow-e’en eve, Welles and his group staged the ultimate in radio thrillers, a science fiction fantasy that sent people running into the streets in terror. That night a series of disjointed events went into motion that would make The War of the Worlds the most famous single radio show ever broadcast.\n\nFirst came basic dissatisfaction of the Mercury staff with the story. H. G. Wells’ fantasy about invaders from Mars who landed in England with their terrible mechanical fighting machines seemed highly futuristic when it was published in 1898. Forty years later, the Mercury staff fretted over its credibility. Writer Howard Koch phoned Houseman the Tuesday before the broadcast, distraught over the assignment. There was no way this ancient epic could be adapted effectively for modern radio.\n\nHouseman considered changing plays. Lorna Doone was available, but coming on the heels of several traditional classics, it seemed a dull alternative. Houseman phoned Welles, who was deep in rehearsal for the Mercury play, Danton’s Death. Welles wouldn’t come to the phone, so Houseman told Koch to go ahead with the script, and he—Houseman—would come over and help.\n\nBy the time Houseman had arrived, Koch had gotten his Martians down to earth and was spreading poisonous black smoke across the marshlands of New Jersey. The two men hammered at the script for almost 36 hours, finally wrapping it up on Wednesday night, four days before the broadcast.\n\nOn Thursday morning, the cast was assembled for the first rough rehearsal. The rehearsal was recorded and played back that night in Welles’ office. Everyone was despondent. As written and rehearsed, The War of the Worlds just didn’t make it. Somehow it had to be modernized, its newscast simulations heightened and intensified. Real names and details had to be added, to give the illusion of up-to-the-minute reality. Already the London setting of the novel had\nbecome Grover's Mill, New Jersey. Now narrative became news bulletin as the staff worked over the script through the night. Horrid present-tense reports of thousands killed, of poison gas spreading westward, of route instructions for getting out of town, were written in. More bulletins were added, of fires and of people crushed in the mad stampede away from the scene. \"Seven thousand armed men, pitted against the single fighting machine of the invaders from Mars—120 known survivors...\"\n\nFriday afternoon, the revised script was passed by the CBS censors, with few alterations. The Hotel Biltmore was changed to the Park Plaza; President Roosevelt was changed to the nameless \"secretary of the interior;\" a few other actual names were deleted. Welles still hadn't come to the studio by Saturday, so the afternoon rehearsal was done without him. Frank Readick, who played newsman-in-the-field Carl Phillips, had dug out the transcriptions of Herb Morrison's on-the-scene report of the Hindenburg crash at Lakehurst, New Jersey. Morrison's emotional broadcast, filled with weeping as scores of people died before him, became Readick's model in describing the horrors of the Martian heat ray.\n\nFor all purposes, The War of the Worlds was ready to air. Then Welles began to add his magic touches. Early news bulletins were dragged out and lengthened, over the objections of staff. The first orchestra number—\"La Cumparsita\" by the fictional Ramon Raquello and his Orchestra—was beefed up; a later number by \"Bobby Milette\" was also lengthened. Welles' theory was simple: \"The War of the Worlds\" would work by contrast. The slow passage of time early in the show would contribute to the illusion of reality; then the tempo would pick up dramatically, with the opening of the Martian cylinder, and would rush to climax with express-train speed.\n\nThey were exactly 12 minutes into the broadcast when things began happening. Precisely at that minute, Edgar Bergen brought out a singer on NBC, and an estimated 3 to 6 million listeners went dial-twisting. Most of them froze when they heard shrill news bulletins about something happening on Mars. Hitler's antics had the nation jumpy anyway; when reports of a warlike confrontation in eastern New Jersey began shaping up, few listeners changed the station.\n\nAs a result, they missed the full opening signature, which made clear that the Columbia Broadcasting System and its affiliated stations were presenting Orson Welles and The Mercury Theatre on the Air in The War of the Worlds, by H. G. Wells. What they did hear was \"Carl Phillips,\" giving an on-the-scene report of a cylinder of unknown origin hitting earth \"with almost earthquake force\" near Grover's Mill, New Jersey.\nLadies and gentlemen, this is the most terrifying thing I have ever witnessed—wait a minute! Someone's crawling out of the hollow top—someone or . . . something. I can see peering out of that black hole two luminous discs. Maybe eyes, might be a face . . . Good heavens, something's wriggling out of the shadow like a gray snake. Now it's another one . . . They look like tentacles . . . I can see the thing's body now—it's large as a bear. It glistens like wet leather. But that face, it's . . . it's . . . ladies and gentlemen, it's indescribable; I can hardly force myself to keep looking at it, it's so awful. The eyes are black and gleam like a serpent; the mouth is . . . kind of V-shaped, with saliva dripping from its rimless lips that seem to quiver and pulsate. The monster or whatever it is can hardly move; it seems weighted down possibly by gravity or something. . . .\n\nThings happened fast from there. The monster rigged its fighting machine, with Phillips giving a running account, and the war of the worlds began. The heat ray turned soldiers to screaming flames; fires spread everywhere, and suddenly Phillips was cut off the air. A piano interlude, another Welles innovation, heightened the horror with its soft touches. Then the bulletins began pouring in.\n\nRed Cross emergency workers dispatched to the scene . . . bridges hopelessly clogged with frantic human traffic. . . .\n\nFinally came the announcement that capped it:\n\nLadies and gentlemen, as incredible as it may seem, both the observations of science and the evidence of our eyes lead to the inescapable assumption that those strange beings who landed in the Jersey farmlands tonight are the vanguard of an invading army from the planet Mars . . . The monster is now in control of the middle section of New Jersey and has effectively cut the state through its center. Communication lines are down from Pennsylvania to the Atlantic Ocean. Railroad service from New York to Philadelphia discontinued, except routing some of the trains through Allentown and Phoenixville. Highways to the north, south, and west are clogged with frantic human traffic. Police and Army reserves are unable to control the mad flight. By morning the fugitives will have swollen Philadelphia, Camden and Trenton, to twice their normal populations. Martial law prevails throughout New Jersey and eastern Pennsylvania. . . .\nBulletins too numerous to read are piling up in the studio here. The central portion of New Jersey is blacked out from radio communication due to the effect of the heat ray upon power lines and electrical equipment.\n\nThe panic began in New Jersey and spread north and west. Men staggered into bars, babbling about the end of the world, and bartenders tuned in just in time to hear Kenny Delmar's icy message as \"the Secretary of the Interior.\" Honoring the censors' ultimatum not to use the President's name, Delmar nevertheless put on his best Roosevelt voice. Word spread that Roosevelt was on the air, giving the public emergency instructions. Martian cylinders were falling all over the country now—in Newark, people wrapped their faces in wet towels and took to the streets in flight. A hospital there treated more than twenty people for shock. At a college campus in North Carolina, students fought over the few available telephones. The editor of the Memphis Press-Scimitar called his staff back to work for an extra edition on \"the bombing of Chicago.\" A woman in Pittsburgh was saved by her husband in an attempt to swallow poison. A power shortage in a small Midwestern town at the height of the show sent people screaming into the streets. In Boston, families gathered on rooftops and imagined that they could see the glow of red against the night sky as New York burned.\n\nThe panic spread into the South—there were wild rumors that New York had been hit by a planetoid, with casualties running into millions. People gathered in churches from Richmond to Birmingham, praying to their Maker, and from towns near the Rockies people scattered into the hills, losing themselves so thoroughly that sheriffs' posses ultimately had to track", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-entertainment", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-entertainment/part-00-00000.npy", "text": ", Deputy Head of Press & PR\nEmma.hewitt@bfi.org.uk\n020 7173 3264 / 07584 264 618\n\nTina McFarling, Media Advisor, Corporate, Partnerships & Industry\nTina.McFarling@bfi.org.uk\n020 7957 4797 / 07879 421 578\n\nJudy Wells, Head of Press and PR, BFI\nJudy.Wells@bfi.org.uk\n020 957 8919 / 07984 180 501\n\nNOTES TO EDITORS\n\nAbout the BFI\nThe BFI is the lead organisation for film in the UK with the ambition to create a flourishing film environment in which innovation, opportunity and creativity can thrive by:\n\n- Connecting audiences to the widest choice of British and World cinema\n- Preserving and restoring the most significant film collection in the world for today and future generations\n- Championing emerging and world class film makers in the UK - investing in creative, distinctive and entertaining work\n- Promoting British film and talent to the world\n- Growing the next generation of film makers and audiences\n\nThe BFI is a Government arm’s-length body and distributor of Lottery funds for film. The BFI serves a public role which covers the cultural, creative and economic aspects of film in the UK. It delivers this role:\n\n- As the UK-wide organisation for film, a charity core funded by Government\n- By providing Lottery and Government funds for film across the UK\n- By working with partners to advance the position of film in the UK.\n\nFounded in 1933, the BFI is a registered charity governed by Royal Charter. The BFI Board of Governors is chaired by Josh Berger CBE.\n\nThe BFI London Film Festival\nBFI London Film Festival is Britain’s leading film event and one of the world’s best film festivals. It introduces the finest new British and international films to an expanding London and UK-wide audience and attracts significant international film industry participation. LFF is a compelling combination of diverse films, red carpet\nglamour, friendly audiences and vibrant exchange. LFF provides an essential profiling opportunity for films seeking global success; promotes the careers of British and international filmmakers through its industry and awards programmes and positions London as the world’s leading creative city.\n\n**About American Express**\nAmerican Express is a diversified worldwide travel, financial and network services company founded in 1850. It is a leader in charge and credit cards, Travellers Cheques, travel and insurance products.\n\nThrough American Express Invites®, Cardmembers have access to enriched experiences at some of the UK’s most sought after entertainment events, including best seats, exclusive offers and early-on-sale tickets. The company has multi-year partnerships with a range of entertainment institutions including AEG, Live Nation, Ticketmaster, Somerset House, The British Film Institute and National Theatre.\n\nFor more detail on the enriched service American Express offers its Cardmembers, please visit [americanexpress.co.uk/whyamex](http://americanexpress.co.uk/whyamex) or connect with AmericanExpressUK on Facebook or Twitter @AmexUK<|endoftext|>Liverpool Film Seminar\n\n2013 – 2014 series\n\nEvery year, Liverpool Film Seminar invites six experts to deliver a series of talks. Topics vary greatly and the series does not focus on a specific aspect of film. Instead, a range of genres and approaches are celebrated, from historical reach to the internet’s impact on cinematic material.\n\nProfessor Laura Mulvey (Birkbeck College, University of London)\n\nHitchcock’s Blondes and Feminist Film Theory: a Cinema of Voyeurism or a Cinema of Self-reflexivity?\n\nThe ‘Hitchcock blonde’ has become an established cliché image within popular culture today, recognised, recounted and discussed beyond film theory circles. In this lecture Laura Mulvey returns to significance of Hitchcock’s blonde heroines and his voyeuristic cinema for the development her feminist and psychoanalytic approach to film in the 1970s. Recently, after a gap of 40 years, she has returned to the ‘Hitchcock blonde’ to reflect on his cinema as, perhaps, revealing and self-reflexive rather than simply misogynistic.\n\nBiography:\n\nIn 1994, she co-directed with artist/filmmaker Mark Lewis *Disgraced Monuments* (Channel 4) with whom she has also made 23 August 2008 (2013). She is Professor of Film and Media Studies at Birkbeck College, University of London and Director of the Birkbeck Institute for the Moving Image.\nProfessor Jane Feuer (University of Pittsburgh, USA)\n\nTheatricality and Quality Drama: a Neglected Connection\n\nAlthough HBO-style \"not TV\" dramas may be considered an offshoot of indie cinema, and although some HBO auteurs such as David Chase consider themselves to be filmmakers, the debt quality drama owes to a theatrical playwrighting tradition may be even greater than the influence of cinema. A newspaper article referred to Aaron Sorkin as \"the playwright, television writer and Oscar-winning screenwriter of The Social Network\" in that order. Writers on In Treatment and Six Feet Under have been cited for their backgrounds as playwrights, not as filmmakers. Network television, picking up on the quality TV style for the 2012 drama SMASH not only set the show in the theater, but also hired playwright Theresa Rebeck as the first season showrunner. HBO has awarded grants to develop playwrights. Writers and producers originating in theater dominated television drama in the 1950s and they dominate quality drama today to a much greater extent than has been recognized by academic TV scholars coming from cinema studies. Theater people can also be found in quality dramas of the 1980s that seem to have been eclipsed by post-HBO dramas. Theatricality is also a sensibility and a mode of scene construction; these too can be shown to be a major influence on television drama. Theater as an origin relates to the demographics of quality drama. This audience appreciates the higher cultural capital theater has over film, and HBO has not hesitated to publicize its link to the theater. The paper will argue about the importance of playwrights in US TV and the impact of theatricality on contemporary TV dramas.\n\nBiography:\n\nJane Feuer is Professor of English at the University of Pittsburgh where she teaches in the Film Studies Program. She has lectured internationally on Hollywood musicals and television. Her current work involves \"quality drama\" as it has evolved on U.S. television since the 1990s. Previously she wrote about earlier quality dramas in Seeing through the Eighties. She was one of the founders of Television Studies as it emerged out of film studies from the 1980s to the present.<|endoftext|>PRIZES AND AWARDS\n\n- Best Chopin Piano Concerto: $8,000\n- Non-prize Semifinalists: $1,000 (for the 10 best)\n- 1st Prize Winners: $15,000\n- 2nd Prize Winners: $10,000\n- 3rd Prize Winners: $5,000\n- 4th Prize Winners: $4,000\n- Audience Award: Certificate\n\nREGULATIONS\n\nELIGIBILITY\n\n- Applicants who have won the first and second prizes in any major international piano competitions, which should be announced before July 1, 2021.\n- They must confirm their acceptance in the competition form before 23:59(GMT) September 15, 2021. All important documents and materials should be sent in before 23:59(GMT) September 15, 2021.\n- Applicants born on or after November 7, 1990 may apply for the competition.\n\nARTISTIC DIRECTOR\n\nFu Renchang\nAssociate Head of Conducting Department, Shanghai Philharmonic Orchestra\n\nTHE PURPOSE\n\nThe China Shenzhen International Piano Concerto Competition (CSIPCC) is a pan-national public piano competition. It aims to promote international exchange and collaborations in this field and discover outstanding young pianists of the new era with Chinese characteristics. It further serves to promote the development of the cultural exchange and cultural cooperation between China and Shenzhen, and to promote the cultural development of Shenzhen.\n\nREGULATIONS\n\n- The 1st Prize Winners will receive a contract with Shenzhen Symphony Orchestra.\n- Rehearsals for Semifinals will be held on 30 October - 1 November, 2021. The 1st Prize Winners will be announced on 2 November, 2021.\n- After each round of the competition, the Organizing Committee will number the audition form and pass them on to the Screening Jury. The Jury will decide the top 70 candidates to advance to the Preliminaries.\n- The length of performance should not be longer than 30 minutes. One piece of own choice from any period (about 8-10 minutes).\n- From the Semifinal round, the Organizing Committee will provide practice rooms with time and a practising room for the contestants who prefer to stay with host families.\n- Host families will provide daily practicing pianos.\n- The Organizing Committee will provide standard accommodation and personal belongings insurance.\n- Organizers are not responsible for loss or damage to personal belongings during the competition.\n\nREPERTOIRE\n\n- 30 minutes performance without interval. Any one of the following concertos:\n - Tchaikovsky Piano Concerto No.1 in B-flat minor, Op.23\n - Brahms Piano Concerto No.2", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": " standards apply. Copies of current Occupational Safety and Health Standards are available from regional and/or area offices of the U.S. Department of Labor, Occupational Safety and Health Administration.\n\nc. If this contract or order contains a Postal Service standard and an OSHA standard covering the same general area of applicability, the Postal Service standard governs and takes precedence, unless the OSHA standard contains more rigorous or stringent safety requirements, in which case the OSHA standard governs and takes precedence.\n\nd. Upon delivery of the first article under the contract or order, or if none, upon delivery of the first production quantity, the supplier must execute a certification in a form acceptable to the contracting officer, attesting to the conformance of the delivered items to the requirements of this clause.\n\nClause B-29: (Reserved) (March 2006)\n\nClause B-30: Permits and Responsibilities (March 2006)\n\nThe supplier is responsible, without additional expense to the Postal Service, for obtaining any necessary licenses and permits, and for complying with any applicable federal, state, and municipal laws, codes, and regulations in connection with the performance of the contract. The supplier is responsible for all damage to persons or property, including environmental damage, that occurs as a result of its omission(s) or negligence. The supplier must take proper safety and health precautions to protect the work, the workers, the public, the environment, and the property of others.\n\nClause B-31: (Reserved) (March 2006)\n\nClause B-32: Differing Site Conditions (March 2006)\n\na. The supplier must promptly, and before such conditions are disturbed, notify the contracting officer in writing of:\n\n (1) Subsurface or latent physical conditions at the site differing materially from those indicated in this contract; or\n\n (2) Unknown physical conditions at the site, of an unusual nature, differing materially from those ordinarily encountered and\ngenerally recognized as inherent in work of the character provided for in this contract.\n\nb. The contracting officer shall promptly investigate the conditions, and if such conditions do materially so differ and will cause an increase or decrease in the supplier's cost of, or the time required for, performance of any part of the work under this contract whether or not changed as a result of such conditions, an equitable adjustment shall be made and the contract modified in writing accordingly.\n\nc. No claim of the supplier under this clause shall be allowed unless the supplier has given the notice required in a. above; provided however, the time prescribed thereof may be extended by the Postal Service.\n\nd. No claim by the supplier for an equitable adjustment under this clause will be allowed if asserted after final payment under this contract.\n\nClause B-33: Inspection and Acceptance (Construction) (March 2006)\n\na. Except as otherwise provided in this contract, inspection and testing by the Postal Service of materials and workmanship shall be made at reasonable times and at the site of the work, unless the contracting officer determines that it shall be made at the place of production, manufacture, or shipment of such material. The contracting officer's decision shall be conclusive as to whether the material involved conforms to the contract requirements. Such off-site inspection or test shall not relieve the supplier of responsibility for damage to or loss of the material prior to acceptance, nor in any way affect the continuing rights of the Postal Service after acceptance of the completed work under the terms of paragraph f. of this section.\n\nb. The supplier shall without charge, replace any material or correct any workmanship found by the Postal Service not to conform to the contract requirements, unless the Postal Service consents to accept such material or workmanship with an appropriate adjustment in contract price. The supplier shall promptly segregate and remove rejected material from the premises.\n\nc. If the supplier does not promptly replace rejected material or correct rejected workmanship, the Postal Service may, by contract or otherwise, replace or correct it and charge the cost to the supplier.\n\nd. The supplier must furnish (without charge) all facilities, labor, and materials needed to conduct inspections and tests as required by the contracting officer. The supplier will be charged any additional costs of inspection if material and workmanship are not ready at the time specified by the supplier for inspection.\n\ne. The Postal Service may examine completed work by removing or tearing it out. The supplier must replace or correct any work found not to conform to contract requirements. If work is torn out and found to comply with contract requirements, the contracting officer must make an equitable adjustment for the services provided for the inspection and replacement of the work.\nf. The Postal Service will inspect the work as soon as practicable after completion. Acceptance by an authorized Postal Service representative is conclusive except in the case of latent defects, fraud, gross mistakes amounting to fraud, or Postal Service rights under any warranty or guarantee.\n\nClause B-34: Notice to Proceed and Commencement, Prosecution and Completion of Work (March 2006)\n\nNo work will be performed except pursuant to a Notice to Proceed issued by the contracting officer.\n\nThe supplier will be required to:\n\na. Commence work under this contract within 10 calendar days after the date the supplier receives the Notice to Proceed,\n\nb. Prosecute the work diligently, and\n\nc. Complete the entire work, ready for use not later than ___________ calendar days from the date of receipt of the Notice to Proceed. The time stated for completion includes final cleanup of the premises.\n\nClause B-35: Specifications and Drawings (March 2006)\n\na. The supplier must keep at the site, copies of the drawings and specifications and must at all times give the contracting officer access to them. Anything mentioned in the specifications and not shown on the drawings, or shown on the drawings and not mentioned in the specifications, is of like effect as if shown or mentioned in both. In case of discrepancy or conflicts between drawings and specifications, the specifications will govern.\n\nb. In case of difference between small and large-scale drawings, the large-scale drawings will govern. Schedules on any contract drawing will take precedence over conflicting information on that or any other contract drawing. On any of the drawings in which a portion of the work is detailed or drawn out and the remainder is shown in outline, the parts detailed or drawn out will apply also to all other like portions of the work.\n\nc. When the word “similar” appears on the drawings, it has a general meaning and must not be interpreted as meaning identical, and all details must be worked out in relation to their location and connection with other parts of the work.\n\nd. In case of discrepancy either in figures, drawings, or specifications, the matter must be promptly submitted to the contracting officer, who will promptly make determination in writing. Any adjustment by the supplier without such a determination will be at the supplier’s own risk and expense. The contracting officer must furnish from time to time such detailed drawings and other information as may be necessary.\n\ne. The supplier must verify all dimensions shown of existing work, and all dimensions required for work that is to connect with work now in place,\nby actual measurement of the existing work. Any discrepancies between the contract requirements and the existing conditions must be referred to the contracting officer before the supplier performs any work affected by these discrepancies.\n\nClause B-36 Postal Service Partial Occupancy (March 2006)\n\na. The contracting officer reserves the right of partial occupancy or use of facilities, services, and utilities, before final acceptance, without implying completion or acceptance of any part of the project by the Postal Service. Before such occupancy or use, the contracting officer must furnish the supplier an itemized list of work remaining to be performed or corrected. Failure to list an item will not relieve the supplier of the responsibility for complying with the terms of the contract.\n\nb. Costs incurred as a result of such partial occupancy or use of facilities, services, and utilities are subject to equitable adjustment under the Changes clause.\n\nClause B-37: Changes (Construction) (March 2006)\n\na. The contracting officer may at any time, without notice to any sureties, by written order designated or indicated to be a change order, make changes in the work within the general scope of the contract, including changes:\n (1) In the specifications (including drawings and designs);\n (2) In the method or manner of performance of the work;\n (3) In the Postal Service-furnished facilities, equipment, materials, services, or site; or\n (4) Directing acceleration in the performance of the work.\n\nb. Any other written or oral order (which, as used in this paragraph b., includes direction, instruction, interpretation, or determination) from the contracting officer that causes a change will be treated as a change order only if the supplier gives the contracting officer written notice stating:\n (1) The date, circumstances, and source of the order, and\n (2) That the supplier regards the order as a change order.\n\n This notification must be delivered to the contracting officer within 30 days of receipt of the change order.\n\n If any change under this clause causes an increase or decrease in the supplier’s cost of, or the time required for, the performance of any part of the work under this contract, whether or not changed by any order, the contracting officer will make an equitable adjustment and modify the contract in writing. However, except for claims based on defective specifications, no claim for any change under paragraph b. above will be allowed for any costs incurred more than 20 days before the\nsupplier gives written notice as required. In the case of defective specifications for which the Postal Service is responsible, the equitable adjustment will include any increased cost reasonably incurred by the supplier in attempting to comply with the defective specifications.\n\nd. No claim by the supplier for an equitable adjustment will be allowed if asserted after final payment under this contract.\n\ne. See also Clause B-10: Pricing of Adjustments.\n\nClause B-38", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": ". Purchasing opportunities are publicized to create, promote, and ensure adequate competition. In addition, publicizing purchase opportunities is an effective way of communicating Postal Service requirements to SMWOBs.\n\n2-27.1 **Publicizing Requirements**\nThe purchase/SCM team should use market knowledge to determine whether purchase, subcontracting, and prequalification opportunities should be publicized and, if so, by what means and to what extent. If there is any doubt that an identified pool of sources for any proposal represents the most capable suppliers in the marketplace or will lead to adequate competition, the purchase/SCM team should publicize. Although publicizing requirements is a matter of judgment, purchase opportunities should be publicized if:\n\n- Best value could be realized from candidates not previously identified as potential suppliers.\n- Competitive or noncompetitive awards offer significant subcontracting opportunities.\n- Publicizing will further the Postal Service's supplier diversity objectives.\n- The announcement of such an award may enhance future competition.\n- Publicizing will further the business and competitive interests of the Postal Service.\nThe CO is responsible for publicizing requirements. Methods for publicizing include:\n\n- Announcement in the GPE.\n- Announcement in other media.\n- Presolicitation notices.\n\n2-27.2 **Availability of the RFPs**\n\nWhen the competitive purchase method will be used, enough suppliers should be solicited to ensure adequate competition. In addition, the CO should make a reasonable effort to provide copies of the RFP to any supplier requesting one. If the requirement is being competed among prequalified suppliers, suppliers not on the prequalification list may be provided a copy of the RFP, but they must be told that the Postal Service plans to award the resulting contract to a supplier on the prequalification list. Requests for copies may be denied once a reasonable number of copies have been distributed to the solicited suppliers and others who have requested them. The CO should fully explain to suppliers the unavailability of RFPs.\n\nAlternatively, the CO may make available through FedBizOpps (www.fedbizopps.gov), the GPE, RFPs publicized through the GPE, including specifications and other pertinent information determined necessary by the CO. When practicable and cost-effective, the CO may make additional solicitation-related information accessible through the GPE.\n\nWhen an RFP or solicitation package is so voluminous that it is impracticable to reproduce a reasonable number of copies for those requesting them, a limited number of copies should be made available for sale; the cost should include the cost of reproduction and postage.\n\n2-27.3 **Government Point of Entry**\n\nThe GPE will be used when publicizing requirements because it is recognized by the supplier community as an excellent source for information regarding purchase opportunities and RFPs. The CO will publicize requirements by posting the finalized RFP to the GPE, known as FedBizOpps, at www.fedbizopps.gov. The GPE can also be accessed electronically by the public. If using the GPE, publicizing must not occur later than issue of the RFP.\n\n2-27.4 **Other Media**\n\nIn situations where the GPE does not provide the most effective communications channel, requirements may also be publicized via other media, including newspapers, trade journals, and electronic media. The CO, in conjunction with the purchase/SCM team, must consider:\n\n- Conditions of the current marketplace.\n- Postal Service business needs.\n- Postal Service competitive needs.\n- Subcontracting opportunities that would follow contract award.\nAs another premier business publication regarding solicitation announcements, the *Journal of Commerce* allows the Postal Service a media venue that can be accessed by any supplier. Available online, the *Journal of Commerce* can be viewed at [www.joc.com/](http://www.joc.com/).\n\nAnnouncements of RFPs made available to newspapers, other news media, and trade journals may be made when there is no cost to the Postal Service. However, paid commercial announcements or advertisements may also be used when doing so is determined to be appropriate to stimulate supplier competition. In addition, purchase/SCM teams should consider the use of media to further the Postal Service’s supplier diversity objectives in relation to prime or subcontracting opportunities. The CO must choose the most cost-effective method and which newspapers, trade journals, or other news media will promote the Postal Service’s interests.\n\n### 2-27.5 Presolicitation Notices\n\nIf the purchase/SCM team wishes to identify suppliers, it may do so by issuing a presolicitation notice (also called a \"sources sought\" notice) before issuing the RFP. The notice should:\n\n- Describe the upcoming Postal Service requirement and any applicable qualification requirements.\n- Announce any planned presolicitation conferences.\n- Specify a date by which the supplier must respond to the notice to ensure inclusion on the RFP mailing list.\n\n### 2-27.6 Preproposal Conference\n\nWhenever circumstances suggest that it would add to the success of the purchase, such as when a solicitation contains complicated specifications or SOW, a preproposal conference may be held to brief suppliers. Notice of the preproposal conference should be contained in the solicitation. If time allows, suppliers should be allowed to submit written questions in advance, so that prepared answers may be distributed at the conference.\n\nThe entire purchase/SCM team should attend the conference. The CO or a designated representative must conduct the conference, with the assistance of the purchase/SCM team and assigned counsel, as appropriate.\n\nA record of the conference must be furnished to all of the suppliers who received the solicitation. Because the role of that record is to ensure that all prospective suppliers fully understand the Postal Service’s intent with respect to the purchase, and not necessarily to provide a verbatim reconstruction of the conference, the record may be edited for clarity and brevity and corrected where necessary.\n\n### 2-27.7 Other Topics Considered\n\nSection 2-21, Define Supplier Diversity Objectives.\n\nSection 2-24, Review and Finalize Request for Proposals (RFP).\n2-28 Conduct Reverse Auctions Where Appropriate\n\nWhether to conduct a reverse auction for the purchase of goods or services was determined during the Consider Auctions topic of USPS Supplying Practices Process Step 2: Evaluate Sources. If determined appropriate, a reverse auction is conducted between a buying organization and a group of suppliers who compete against each other to supply goods or services. Such goods and services must have clearly defined specifications for design, quantity, quality, delivery, and related terms and conditions.\n\nReverse auctions rely on competition driving prices down, which means a greater likelihood of success when purchasing less complex or specialized goods or services. Simple commodity items or services, which can be clearly defined and often have a wide range of potential suppliers, will be best suited to the auction process. Although, in some circumstances, there may be only a few eligible suppliers, their market share tends to be great enough to make an auction a viable purchasing option.\n\nIn a reverse auction, participating suppliers bid against each other, via specialized Internet software, by submitting successively lower prices during a scheduled time period. Typically, the lowest bid wins in a reverse auction; however, some full-service auction providers can support very complex auctions to better align the auction with an organization’s business practices. Bidders are able to introduce new or improved values to their bids in a visible and competitive environment. The procedure and duration of the event will be defined before the reverse auction commences, and a starting value that suppliers will bid against until the competition closes will be determined in advance. When used, the auction will be a key stage of the purchasing process.\n\nThe five steps involved in conducting a reverse auction are illustrated in Figure 2.12.\n\n**Figure 2.12**\nReverse Auction Process\n\n![Reverse Auction Process Diagram]\n\n**Plan and Define Auction Requirements**\n\nHaving a clear purchase specification is critical, and should be evident in all sourcing decisions. The better the purchasing description (e.g., consisting of clear specifications for products or SOW for services), the better the sourcing results. A well-planned buy will always provide better sourcing results.\n\nGenerally, in a reverse auction, the buying organization should set a dollar amount higher than the desired final cost for the initial bid. A high dollar amount usually leads to a more favorable outcome for the buying organization in a reverse auction because suppliers bid against each other and drive the price of the product or service down. If the item manager(s) decide to source enough of the organization’s requirements to attract\nsuppliers, the requirements must be robust enough so that the volume can be managed and leveraged by the supply base to drive savings and efficiencies. However, the dollar amount should not be so high as to create potential risks for the organization. The key deciding principle for the appropriate level of a starting bid is the ROI, and it is easier to gain a larger ROI on a larger purchase. In some cases, the suppliers may provide something innovative; therefore, they may have some input into setting the preliminary price.\n\n2-28.2 Determine Software Platform/Service Provider\n\nThe second step in the reverse auction process is to determine the software platform or reverse auction service provider to run the auction. As mentioned earlier in Section 2-15, Consider Auctions, the three levels of auction technology available are:\n\n- Full-Service — a full-service provider hosts the auction process from start to finish.\n- Hosted — the technology is hosted by a third party, but the auctions are organized and run by the buying organization.\n- Self-Service — buying organization oversees all aspects of the auction, including implementing the auction technology internally.\n\nMany companies specialize in reverse auctions. It is critical to choose a Reverse Auction Service Provider with a good reputation and experience in the business. Item managers should examine each firm’s functionality by mandating demonstrations of past auctions run for other companies over a wide range of goods and services.\n\nOnce selected, the Reverse Auction Service Provider should also aid the client and purchase/SCM team in", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": ". 221). Rueda, Peris and Gil (2012) support the idea that the combination of these factors is sufficient to provide a broad, yet satisfactory definition of economic entrepreneurship.\n\nThis small company has forged a business relationship with the government and occasionally sells chocolate to the Haitian government. The company’s product has been served during government functions. It is through this association that the owners’ voices and those of the farmers are being heard. The government is more aware of the plight of the farmers’ challenges in earning a living in rural areas. Because of this business opportunity, the government understands the company’s desire to improve the quality of life for farmers in Haiti and sees the impact it has on its own citizens.\n\nDylick and Hockerts (2002) agree that to grow the three pillars of sustainability, entrepreneurs must pursue this effort through the political domain. The relationship between the company and the government helps guide and promote economic actions. Linnanen (2002) claims that most of the ecopreneurs that he has met run their businesses not only to make money, but to also make the world a better place. He notes that this personal commitment enhances marketing credibility and trustworthiness as business partners. The company has a steady presence in governmental relations, which is invaluable to the farmers in that the company provides end- to-end support to ensure the success and sustainability of the business in the long-term.\n\nIn summary, economic entrepreneurship is important to the economy as the entrepreneur and those invested in the company can provide the knowledge, skills, and ability to create a product or service. If the company manages itself in a way that turns a profit, it can also add jobs and create opportunities for employees to make money as well. In turn, employees have an improved opportunity to spend at least a portion of that money in their local economy and use it to improve their well-being and standard of living.\n\nLink to Environmental Entrepreneurship\n\nEco-efficiency\n\nThe earth provides finite resources, and how we choose to use and replenish those resources affects the efficiency and effectiveness of ecological sustainability (Lovins, Lovins, & Hawken, 1999). Eco-efficiency is described by Dylick and Hockerts (2002) as the value that a business includes related to its cumulative ecological impact. Another definition of eco-efficiency is “the delivery of competitively-priced goods and services that satisfy human needs and bring quality of life, while progressively reducing ecological impact and resource intensity throughout the life-cycle to a level at least in line with the earth’s carrying capacity” (DeSimone & Popoff, 1997, p. 47). Humans, animals, and plants rely on the earth for resources. If these resources are not taken care of properly, we will not be able to take care of ourselves. Therefore, eco-efficiency is a valuable part of many corporate strategies, and it directly relates to the efficiency of the environment (Dylick & Hockerts, 2002).\n\nAs economic growth relates to cacao production, the cacao tree needs little attention or time from the farmer. The output is restricted due to not using or not knowing about effective farming techniques. With cacao profits dropping in the 1970s, many cacao farms were abandoned and the farming techniques have not been needed for the last 40 years (Wegbert, 2015). It would take a specialist to determine if the abandoned cacao farms are worth the effort to rehabilitate as the cacao trees reach their peak production by the 20th year and then begin to decline (2015). However, improving the condition of and the care for\nthe trees can lead to five to eight times more cacao (Taylor, 2015). This increase in output leads to eco-\nefficiency. Replanting is also an opportunity despite having to wait for the cacao tree to mature.\n\nSince maintenance of cacao trees is minimal, some farmers are not concerned with improving output. Many older farmers plan to rely on cacao production for passive income in their retirement (Wegbert, 2015). The farmers have an opportunity to earn more income if they are given the right tools to increase output. Eco-efficiency is concerned with “doing more with using less, thus improving the relative performance on indicators such as decreasing harmful emission/economic output or increasing the value of economic output/natural resource input” (Csutora, 2011). By using sustainable crop production techniques, output increases, and farmers earn more money to improve their standard of living.\n\nIn connecting environmental entrepreneurship with economic entrepreneurship, Keijzers (2002) suggests that in creating new technologies, new coalitions should be formed, maybe in the form of a new company, to overcome the obstacles of competitive rivalry. In this particular case, the small company recently created a new joint venture with the largest coffee producer in Haiti to increase scale and move rapidly toward creating more production opportunities. One benefit of this alliance is the entrepreneurs can use the size and brand equity of the larger company to increase market reach and grow market share. Although the smaller company is not organically or fair trade certified, the larger company is. Because of this the smaller company can become certified through the joint venture and use the technologies from the larger company to create such products as organic chocolate.\n\n*Eco-effectiveness*\n\nAlthough eco-efficiency and eco-effectiveness are needed for ecological sustainability, the focus should be on producing a greater environmental good (Dyllick & Hockerts, 2002). Eco-effectiveness should be the main goal of environmental sustainability to ensure positive environmental impacts through reforestation, soil improvement, cacao tree growth, and chocolate production. Dedicating certain land to organic farming could assist in this movement. The owners want to ensure the land will not only produce, but also create a place where the trees are taken care of in a way that produces the most output without harming future crops. The owners do not want to stretch beyond the environment’s capacity; however, this does not appear to be an issue as the company looks to use this as an opportunity to assist in reforestation efforts in the country.\n\nAs advocates for the farmers, the friends hope to improve their chances for success on a global scale. Sustainable cocoa production in Haiti hinges on the following factors: farm gate price, farm size, property ownership, land configuration and rural infrastructures, networking, and animal feeding practices (Wegbert, 2015). Haiti’s natural resources are limited and ownership of property is important for farmers as they are not well motivated to take care of other people’s property if they are only partially benefitting financially from the harvest. If the farmers are not working on other people’s land, then most of the remainder of the farmers own very small plots of land. In addition, threats to the farm include diseased pods, climate change/drought, low producer prices and corruption with farmer co-ops (Wegbert, 2015). For example, domestic animals run free on land and eat tree seedlings, which reduces output. Farm ownership and effective farm management are important for continued success.\n\n**Link to Social Entrepreneurship**\n\n*Socio-efficiency*\n\nOne of the world’s largest issues is how to alleviate poverty, and a step in the right direction involves improving the economic conditions of the poor. The Schwab Foundation for Social Entrepreneurship (n.d.) states that social entrepreneurs pursue the eradication of poverty, while maintaining a focus on producing social and ecological value, and while also improving financial value. Social entrepreneurs can create a stable approach for individuals and communities to improve social and economic conditions. In the case of the Haitian farmers, it is not just an economics issue; it is also an environmental issue.\n\nSocio-efficiency is associated with economics. From the Dyllick and Hockerts (2002) sustainability model discussed in Young and Tilley’s 2006 article, socio-efficiency is “the relation between a firm’s value added and its social impact” (2002, p. 134). Dyllick and Hockerts add to the discussion by stating:\n“Socially sustainable companies add value to the communities within which they operate by increasing the human capital of individual partners as well as furthering the societal capital of these communities. They manage social capital in such a way that stakeholders can understand its motivations and can broadly agree with the company’s value system” (Dyllick & Hockerts, 2002, p. 134).\n\nOne of the pillars of sustainability entrepreneurship is social entrepreneurship, and sustainability is about efficiency and effectiveness. To improve economic conditions, social and environmental issues must be addressed (Dyllick & Hockerts, 2002). The owners must be careful to balance efficiencies without negatively affecting the environment in the long run. Reforestation is helpful, but to stay balanced, the value added must be more than the cost to the environment, economy, and farmers. The owners of the company were most concerned about improving the lives of the Haitian farmers by creating a business that could provide an atmosphere of economic opportunity and hope for the future. They realized it was about the social benefit as well as the economic benefit. It is important that someone serve as the advocate for the farmers with the government and bring attention to their efforts. The government is an important constituent as the company can lobby for improved regulations and policies on behalf of the farmers.\n\n**Socio-effectiveness**\n\nSocio-effectiveness refers to the valuation of a firm’s social performance (Dyllick & Hockerts, 2002). A question to consider is if the products are accessible and if the benefits are for all or for just a few people (2002). The Haitian farmers can make a chocolate product, but the owners need to ensure that the market is aware", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": " function with habit formation; refer to Appendix 2 for details.\n\n**Appendix 4:** The partial derivatives of dividends with respect to explanatory variables\n\nConsider the optimal aggregated dividend as a linear function of underlying variables:\n\n$$ d = a_0 + a_1 k + a_2 c + a_3 l + a_4 q + a_5 z $$\n\nTo derive the partial derivative of dividends with respect to each variable, we first construct a 5-vector of the covariance of each explanatory variable with $d$: $Y = Cov(d, x)$. We also construct a variance-covariance matrix of all explanatory variables, $X$, with the $i$th row given by $Cov(x^T, x_i)$, and a 5-vector, $a$, with elements $a_i$ that denote the partial derivatives:\n\n$$ Cov(d, x_i) = Cov(a_0 + a_1 k + a_2 c + a_3 l + a_4 q + a_5 z, x_i) $$\n\n$$ \\Rightarrow Cov(d, x_i) = \\sum_{j=1}^{5} a_j Cov(x_j, x_i) $$\n\n$$ \\Rightarrow Y = Xa $$\n\n$$ \\Rightarrow a = X^{-1}Y $$\n\nWe calculate the partial derivative of the optimal aggregated dividends with respect to capital input ($k$), consumption ($c$), labor ($l$), equity price ($q$) and technology shock ($z$) for the VM model and the RA model in the case of habit persistence of 0.8:\n\n
\n\n
\n
Model
\n
VM
\n
RA
\n
\n\n\n
\n
$\\frac{\\partial d}{\\partial k}$
\n
-0.212
\n
0.002
\n
\n
\n
$\\frac{\\partial d}{\\partial c}$
\n
-1.796
\n
0.144
\n
\n
\n
$\\frac{\\partial d}{\\partial l}$
\n
-9.600
\n
0.102
\n
\n
\n
$\\frac{\\partial d}{\\partial q}$
\n
0.436
\n
0.002
\n
\n
\n
$\\frac{\\partial d}{\\partial z}$
\n
1.132
\n
-0.082
\n
\n\n
\nFig. 1. Sensitivity of aggregate dividends and consumption to the habit motive\nFig. 2. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case without habit persistence for the VM model ($\\xi = 0$)\n\nFig. 3. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case with habit persistence for the VM model ($\\xi = 0.8$)\nFig. 4. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case without habit persistence for the RA model ($\\xi = 0$).\n\nFig. 5. The impulse responses of optimal aggregate dividends ($d$), consumption ($c$), debt ($b$), and investment ($i$) in the case with habit persistence for the RA model ($\\xi = 0.8$).\nTable 1. Calibration values for the models’ parameters\n\n
\n\n
\n
Parameters
\n
Notation
\n
Value
\n
\n\n\n
\n
Capital share to output
\n
$\\alpha$
\n
0.35
\n
\n
\n
Depreciation ratio
\n
$\\eta$
\n
0.019
\n
\n
\n
Subjective time discount factor
\n
$\\beta$
\n
0.99
\n
\n
\n
Persistence of the technology shock
\n
$\\psi$
\n
0.95
\n
\n
\n
Standard deviation of the technology shock
\n
$\\sigma_{\\varepsilon}$
\n
0.00712
\n
\n
\n
Recovery rate
\n
$\\theta$
\n
0.92
\n
\n
\n
Tax rate
\n
$\\tau$
\n
0.06
\n
\n
\n
Time allocated to market activities
\n
$\\rho$
\n
0.36
\n
\n
\n
Coefficient of relative risk aversion of the household
\n
$\\gamma$
\n
2
\n
\n
\n
Upper bound
\n
$U$
\n
1.225
\n
\n
\n
Lower bound
\n
$L$
\n
0.475
\n
\n
\n
Habit persistence
\n
$\\xi$
\n
Given
\n
\n\n
\n\nThis table displays a summary of parameter values. Rows 1-7 are taken from Alessandrini (2003). Row 8 is taken from Campbell (1994). Rows 9 - 11 are values commonly used in literature. Habit persistence is allowed to take a range of different values from 0 to 0.8 with an interval of 10%.\nTable 2. Mean and relative standard deviation (RSD in %) for the VM model and the US economy\n\n
\n\n
\n
\n
0
\n
0.1
\n
0.2
\n
0.3
\n
0.4
\n
0.5
\n
0.6
\n
0.7
\n
0.8
\n
\n\n\n
\n
$\\xi$
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
$d$
\n
0.09
\n
0.09
\n
0.09
\n
0.09
\n
0.09
\n
0.09
\n
0.09
\n
0.09
\n
0.09
\n
\n
\n
$c$
\n
0.91
\n
0.91
\n
0.92
\n
0.92
\n
0.92
\n
0.92
\n
0.93
\n
0.94
\n
1.91
\n
\n
\n
$y$
\n
1.19
\n
1.19
\n
1.19
\n
1.20
\n
1.20
\n
1.20
\n
1.21
\n
1.22
\n
3.06
\n
\n
\n
$l$
\n
0.32
\n
0.32
\n
0.32
\n
0.32
\n
0.32
\n
0.33
\n
0.33
\n
0.33
\n
2.39
\n
\n
\n
$i$
\n
0.26
\n
0.26
\n
0.26
\n
0.26
\n
0.26
\n
0.26
\n
0.26
\n
0.26
\n
9.05
\n
\n
\n
$b$
\n
5.40
\n
5.40
\n
5.41
\n
5.41
\n
5.42
\n
5.43
\n
5.45
\n
5.48
\n
5.54
\n
\n
\n
$w$
\n
27.38
\n
27.36
\n
\n\n
\n
Scoring Criteria
\n
Weight
\n
\n\n
\n
\n
Questionnaire
\n
\n
\n
\n
• Functionality
\n
0-30
\n
\n
\n
• Workflow/Routing/Administration
\n
\n
\n
\n
• Reporting
\n
\n
\n
\n
• Account Management
\n
\n
\n
\n
• Implementation
\n
\n
\n
\n
• Pricing
\n
\n
\n
\n
Pricing Sheet
\n
\n
\n
\n
• Expense Management or
\n
0-30
\n
\n
\n
• Full Service Agent / Booking Tool
\n
\n
\n
\n
References
\n
0-20
\n
\n
\n
Qualifications & Experience
\n
0-20
\n
\n\n
\n\nNote: Vendors submitting for Expense Management *only* will not be scored against vendors submitting against Travel Agent Services and Booking Tools.\n\nPresentations: Following the initial evaluation, qualifying vendors may be asked to provide a presentation to the University’s scoring committee. More information will be available upon selection.\n## Pricing Sheet\n\n*If you cannot provide some of the services listed, please respond as not applicable.*\n\n
\n\n
\n
Description
\n
Fees
\n
\n\n\n
\n
Expense Management:
\n
\n
\n
\n
Lump Sum Fee
\n
\n
\n
\n
Additional Cost per Transaction
\n
\n
\n
\n
Full Service Agent Assist Transactions:
\n
\n
\n
\n
Domestic airline ticket
\n
\n
\n
\n
Domestic airline ticket refunded
\n
\n
\n
\n
Domestic airline ticket exchanged
\n
\n
\n
\n
International airline ticket
\n
\n
\n
\n
International airline ticket refunded
\n
\n
\n
\n
International airline ticket exchanged
\n
\n
\n
\n
Airline ticket that is part of a group-domestic
\n
\n
\n
\n
Group airline ticket refunded-domestic
\n
\n
\n
\n
Group airline ticket exchanged-domestic
\n
\n
\n
\n
Airline ticket that is part of a group-international
\n
\n
\n
\n
Group airline ticket refunded-international
\n
\n
\n
\n
Group airline ticket exchanged-international
\n
\n
\n
\n
Consolidator airline ticket-international
\n
\n
\n
\n
After-hours emergency phone call
\n
\n
\n
\n
Car reservation only
\n
\n
\n
\n
Hotel reservation only
\n
\n
\n
\n
Rail ticket - domestic and international
\n
\n
\n
\n
Car service reservation
\n
\n
\n
\n
Online Booking Tool Transactions:
\n
\n
\n
\n
Domestic airline ticket
\n
\n
\n
\n
Domestic airline ticket refunded
\n
\n
\n
\n
Domestic airline ticket exchanged
\n
\n
\n
\n
International airline ticket
\n
\n
\n
\n
International airline ticket refunded
\n
\n
\n
\n
International airline ticket exchanged
\n
\n
\n
\n
Change or cancellation with travel agent to an airline ticket, hotel, and/or car reservation purchased through the OBT
\n
\n
\n
\n
Assistance with purchase of airline ticket, hotel reservation, car reservation begun in the OBT, but completed with a travel agent
\n
\n
\n
\n
Car reservation only
\n
\n
\n
\n
Hotel reservation only
\n
\n
\n
\n
Applying a ticket credit to an airline reservation
Customized reports not listed in scope of work (per hour fee)
\n
\n
\n
\n
Call to the OBT Help Desk
\n
\n
\n
\n
Reporting tool
\n
\n
\n
\n
Non-standard reports as requested
\n
\n
\n\n
\nThe proposer states that he/she has carefully examined the specifications of having carefully examined the proposal documents and being familiar with the requirements therein, hereby submits their proposal to provide such services meeting the requirements outlined in this RFP.\n\n
\n\n
\n
Name
\n
\n
\n\n\n
\n
Title
\n
\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": ". The second set imposes only the restrictions used for the shocks of interest, i.e., the stock market shock and the monetary policy shock. Finally, R3 represents the full set of restrictions from Bjørnland-Leitemo except for the long-run restriction. Thus, imposing only those restrictions does not fully identify the shocks of interest. All these sets of restrictions are either under-identifying or just-identifying.\nin a conventional framework. Hence, testing them requires additional identifying restrictions that we get from the changes in volatility in the variables.\n\n4.2 The Volatility Model\n\nWe estimate the standard VAR and three (conditional) heteroskedastic VARs with different assumptions on the evolution of volatility. The VAR order is chosen to be three as suggested by the Akaike information criterion (AIC) in a conventional model that does not allow for heteroskedasticity. Bjørnland and Leitemo (2009) use four lags based on lag reduction tests for their shorter data range.\n\nIn practice, if changes in volatility are suspected, it is useful to think about the most suitable volatility model for a particular application. For the system of interest here, volatility changes are likely, for example, because a financial variable such as $\\Delta sp_t$ is included. It is not easy to link the volatility changes to specific exogenous events and, hence, to specific parts of the sample period. Therefore a model that assigns the volatility states endogenously makes more sense than a model with exogenous volatility changes. Given the stock returns in the system one may think of a GARCH model. However, also the MS model can capture similar conditional heteroskedastic structures. Therefore it is a priori equally suitable if enough volatility states are allowed for. If the volatility change is sufficiently smooth, also the ST model is a possibility. It is used, in fact, by Lütkepohl and Netšunajev (2014b) for the presently considered system and we draw on the results from that study for the ST-SVAR model in the following. In deciding on the volatility model it may be useful to inspect the residuals from a standard VAR analysis. They are presented in Figure 5 and show that there are indeed considerable changes in volatility throughout the sample and capturing them with a model with exogenously assigned volatility regimes may not be easy. Therefore we consider all three models with endogenous assignment of volatility states in the following.\n\nClearly, a visual inspection of the residuals is not enough for making a good decision on the most suitable volatility model. Such visual tools have to be complemented with statistical criteria such as information criteria. Therefore we show values of the Akaike information criterion and the Schwarz criterion (SC) for different models in Table 1. Notice that in all the volatility models a state-invariant initial effects matrix $B$ is assumed and the VAR order is 3 for all models. The GARCH model is estimated with 5 univariate GARCH(1,1) components. It turns out that all (conditionally) heteroskedastic SVARs perform much better than the standard VAR according to AIC and SC. In fact, both criteria are minimized for the MS-SVAR\nmodel with 3 volatility states. We did not try to estimate MS models with more volatility states because for a 5-dimensional model that would have been a major computational challenge and the estimates cannot be expected to be reliable.\n\nThe ultimate objective is, of course, to capture the volatility well with our models. Therefore it is instructive to look at the standardized residuals\n\n\\[ \\hat{u}_{kt}/\\hat{\\sigma}_{kk,t} \\]\n\nobtained for the different models. Here \\( \\hat{\\sigma}_{kk,t}^2 \\) is the \\( k \\)th diagonal element of the estimated residual covariance matrix or conditional covariance matrix for period \\( t \\), depending on the model considered. These quantities are plotted in Figure 2 for the models with time-varying volatility. Notice that these are not the structural residuals obtained from these models but reduced-form residuals. The graphs are just meant to give a visual impression of possible remaining volatility changes or the ability of the different models to actually capture the volatility changes in the reduced-form residuals.\n\nComparing to the residuals in Figure 5, all models appear to improve on a model without allowance for volatility changes. However, the volatility models differ in their ability to capture the volatility in the data well. The visual impression is that the ST-SVAR model leaves quite some unexplained volatility in the residuals. Also, the MS(2) model appears to be inferior to the MS(3) model. For example, it leaves more heterogeneity in the commodity price residual series than the MS(3) model. Moreover, the GARCH residuals are somewhat disappointing and clearly inferior to the MS(3) residuals. Note, for example, large outliers in the \\( u_t^x \\) series that are not captured by the GARCH model. Also some of the other residual series leave room for improvement relative to the corresponding quantities from the MS(3) model. For example, the volatility changes in the residuals of the output equation, \\( u_t^q \\), are not well captured by the GARCH model. Thus, it is no accident that the AIC and SC criteria prefer the MS(3) model as well.\n\nThese results are perhaps better understood when looking at the transition function of the ST-SVAR model and the smoothed state probabilities of the MS(2)-SVAR and MS(3)-SVAR models in Figure 3. The MS models indicate that the change in volatility is more complex than what is captured by the ST-SVAR model. There does not appear to be a smooth transition from one volatility regime to another if the data are allowed to assign different regimes in a different way as in the MS models. Also allowing for a third state leads to a quite different separation of the sample period than a two state model. This explains why the MS(3) model is preferred over the ST and the MS(2) models. Despite the fact that we favor the MS(3)-SVAR for the\npresent dataset, we continue looking also at the other models for illustrative purposes.\n\n4.3 Identification Analysis\n\nThe first question we have to address is the identification issue. For all three models statistical identification conditions are linked to the changes in volatility. For the ST and MS models they are linked to the relative variances. Estimates of these quantities are shown in Table 2. For the ST and MS(2) models the relative variances in the second state are all less than one. Hence, the ST model moves the volatility from a high volatility state to a lower volatility state. This corresponds well to the fact that the MS(2) model assigns the second, hence, lower volatility state to the latter part of the sample (see Figure 3). In contrast, the first state dominates the second half of the sample in the MS(3) model. Therefore it is plausible that the relative variances of the second and third states assigned by the MS(3) model are all larger than one, that is, the variances are larger than in the first state.\n\nRecall that we have a fully identified ST-SVAR model if all the relative variances are distinct. Taking into account also the standard errors in Table 2, the estimates suggest that at least the first four relative variances are distinct. Formal tests that they are all distinct are presented in Table 3. Note that we have to test $K(K - 1)/2 = 10$ pairs for a system of dimension $K = 5$. For the smooth transition model, the null hypotheses of pairwise equality is rejected at a 10% significance level for all pairs but the last. Thus, we conclude that we have some statistically identified shocks but perhaps not a fully identified ST-SVAR model. In particular, the first three shocks are identified via heteroskedasticity. For a fully identified set of structural shocks we need additional restrictions such as those or some of those used by Bjørnland and Leitemo (2009).\n\nThe standard errors of the estimated relative variances for the MS models in Table 2 tend to be larger than for the ST model and also the estimated relative variances are not clearly distinct in a number of cases. Therefore it is not surprising that the corresponding tests for full identification shown in Tables 3 and 4 do not reject some of the relevant hypotheses. However, they do indicate that the volatility models contain at least some additional identifying information because some of the relevant hypotheses are clearly rejected with $p$-values much smaller than 5% or even 1%. Interestingly, in the MS(2)-SVAR model the tests indicate that the first relative variance is clearly distinct from the others and, hence, the first shock is identified while in the MS(3)-SVAR model the last shock is identified. Note, however, that we are using Wald tests for checking the identification restrictions and these\ntests may not be very reliable (see Lütkepohl and Netšumajev (2014a)). Thus, there may be more identified shocks. Our current statistical procedures do not provide much evidence for them, however.\n\nThe identification issue in the context of the SVAR-GARCH model is a somewhat different one. We have to check the number of univariate GARCH components underlying the GARCH structure. Ignoring the problem and estimating a model with five GARCH components as we have done in the foregoing, some of the GARCH parameters may actually not be identified. Thus, the analysis of the SVAR-GARCH model should ideally start with a thorough investigation of the number of underlying univariate GARCH components. This is of particular importance in analyses such as the present one where it is not clear whether the GARCH structure captures changes in volatility well enough in all variables. Notably variables such as industrial production are not necessarily well modelled by", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-finance_and_business", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-finance_and_business/part-00-00000.npy", "text": "\n
\n
\n
Suitable funding structures for SET FOAK projects:
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity & grant:
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
not lending risk
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity & grant:
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
availability of
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
debt depending on
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
technology types
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity, grant &
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
debt: lender
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
caution, as some
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
precedents have
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
failed
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity, grant:
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
lender caution,
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
as few sectoral
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
& regional
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
precedents.
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Insurance used
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
to cover drilling
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
risks
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity, grant:
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
lenders
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
uncertain of
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
some technologies
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
(not pumped
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
storage) plus
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
demand &
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
business case
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity, grant &
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
debt: very
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
limited as some
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
precedents
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
have failed
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity, grant &
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
debt: lender
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
caution, as some
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
precedents
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
have failed
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
Equity, grant &
\n
✓
\n
✓✓
\n
\n
\n
\n
\n
\n
\n
\n
\n
debt: lender
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
caution and some
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
projects are
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
very high value,
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
requiring
\n
\n
\n
\n
\n
\n
\n
\n
Food Allergens: A Comprehensive Approach For Food Processors To Prevent Unintended Allergens In Their Foodstuffs\n\n- Dairy\n- Egg\n- Crustacean Shellfish\n- Fish\n- Tree Nuts\n- Wheat\n- Peanuts\n- Soybeans\n\nA Food Safety Guide for Food Processors\n\nEHA\nContents\n\nChapter 1: Introduction p.3\n\nChapter 2: Allergens and Food Processors p.4\n\nChapter 3: Food Processors’ Allergen Challenges p.5\n\nChapter 4: Major Risk Areas for Allergen Recalls p.6\n\nPart 1. Controls\n\nA. Product Intake Handling\nB. Allergen Identification\nC. Storage\nD. Cross-Contamination\nE. Product Matrix\nF. Labeling\n i. US Government Regulations\n ii. International Regulations\n iii. Label Allergens\nG. Proper Sanitation\n i. Cleaning Methods\n ii. Inspection\nH. Testing Allergens\n i. Actions That Have To Be Taken\n\nPart 2. Employee Training\n\nChapter 5: Moving Forward p.16\n\nPart 1. Processor\nPart 2. Customers\n\nChapter 6: How EHA Consulting Group, Inc. Can Help p.17\n\nAbout EHA Consulting Group Inc.\n\nEHA Consulting Group, Inc. (EHA) offers comprehensive public health consulting, epidemiology and food safety services before, during and after a crisis. We provide these services to Retail Food, Food Service, Food Processing, and Contract Food Service Management companies.\n\nNeed our Services? Call us today at 800-969-1441.\n\nVisit us at www.ehagroup.com. Follow us on Twitter @EHAConsultingGp.\nIntroduction\n\n“The proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.”\n\nThe proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.\n\nThe following guide from EHA Consulting Group, Inc. (EHA) contains information, best practices, and tools for a food processing company to avoid allergen-related recalls. Key factors in allergen control include poor identification, poor handling, poor storage, improper product matrix, improper labeling, poor sanitization, and inadequate testing. The purpose of this guide is to educate you and your staff on the proper steps to protect your brand and your business from the negative ramifications of an allergens incident and potential recall.\nAllergens and Food Processors\n\n“Up to 15 million Americans have food allergies, 1 in every 13 children under the age of 18.”\n\nWhen it comes to food allergens, what you don’t know could hurt you - as a customer and as a business owner. Up to 15 million Americans have food allergies, including one in every 13 children under the age of 18. Ensuring that a large number of potential customers can safely consume your food is a vital business practice.\n\nAllergens affect people in various ways. Allergens are substances, usually protein in nature, that illicits a reaction that is generically termed an allergic reaction. Allergens do not have to be proteins; they can be chemical, such as sodium bisulfite or MSG (monosodium glutamate) and in non-food settings, they can be dust. Food allergens are an improper reaction of someone’s immune system that most of the population tolerates without any problems. For those who are sensitive to an allergen, consuming one of the over 170 foods that contain allergens could result in symptoms that range from minor tingling all the way to death. Consumers with known allergies diligently select the food they consume to ensure they do not trigger a potential allergic reaction. Therefore, food processors that are distributing or serving foods that may cause an allergic reaction have great responsibility. As a food processor, staying current on allergens and understanding how to protect your end consumers is paramount.\n\nFood processors must be aware of newly emerging allergenic foods and be cognizant of geography-specific rules. While food processors in the United States should familiarize themselves with all allergens, it is of utmost importance to focus controls on the top eight foods containing allergies which are found in fish, eggs, soy, peanuts, tree nuts, wheat, crustacean shellfish, and milk. The European Union has a more comprehensive list of allergens that include the following foods and products thereof: gluten, (i.e. wheat, rye, barley, oats, spelt, kamut or their hybridized strains), crustaceans, eggs, fish, peanuts, soybeans, milk, nuts (i.e., almonds, hazelnuts, walnuts, cashews, pecan nuts, Brazil nuts, pistachio nuts, macadamia nuts and Queensland nuts), celery, mustard, sesame seeds, sulphur dioxide and sulphites at concentrations of more than 10 mg/kg or 10 mg/liter expressed as SO2, lupin, and molluscan. In the Asian markets, Japan’s declared allergens are eggs, milk and dairy products, wheat, buckwheat, shrimp/prawn, peanuts, salmon roe, soybean, kiwi, banana, crab, chicken, tree nuts, squid, mackerel, pork, salmon, gelatin yam and peach. As a processor you may be working with any number of these foods.\nFood Processors’ Allergen Challenges\n\n“Undeclared allergens were the single largest cause of recalls from the USDA in the second quarter of 2013.”\n\nAs a processor, you are charged with great responsibility to ensure that allergens are handled safely. Teams responsible for intake, storage, transfer, processing, labeling, cleaning and testing all have important roles in preventing allergens. Teamwork, communication, and strong control processes are paramount.\n\nUnfortunately, food processors are currently experiencing more challenges with preventing allergen-related issues, leading to recalls and government intervention. Undeclared allergens have been a top trend setter in USDA and FDA recalls for the past six quarters, according to Whitworth of Food Quality News. Undeclared allergens were the single largest cause of recalls from the USDA in the second quarter of 2013, accounting for 60% of recalls and almost doubling from 33% in the first quarter of 2013. A study from Gendel and Zhu from the FDA uncovered trends from recalls between 2007 and 2012. Gendel and Zhu identified that bakery products were the most frequently recalled food type and milk was the most frequently undeclared major food allergen.\n\nGendel and Zhu also found that use of the wrong package or label was the most frequent problem leading to food allergen recalls. This finding tells us that food processors have (at least) one of the following problems:\n\n1. Controls: Processors do not have checks and balances, allowing for mismatch", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": " product definitions. The recommendation was approved.\n\n**Task force on responsibilities of participating states**\n\nThis task force was given six problems. However, problems 2 and 4 were combined.\n\nProblem 1: Should split samples be reduced to a frequency of once a year? The task force recommended that the present requirement of two sets of split samples per year be retained. The recommendation was unanimously approved by the delegates.\n\nProblems 2 and 4 called for ways of making volume control more meaningful and for stricter compliance with volume control provisions. The task force recommended that, when inadequacies are found by either the shipper or receiver, the methods presently outlined in Section VII of the \"Procedures\" dealing with \"Complaints and Challenges\" should be used. The delegates approved this recommendation.\n\nProblem 3 recommended changing the first line in Section V-C, Subitem 4 to read, \"If results of the laboratory and sampling surveys are not . . . . \" The task force recommended the adoption of this change and the recommendation was approved by the delegates.\n\nProblem 5: Consider the need for a specific and detailed sampling procedure to be developed to sample milk in receiving states. The task force stated that Section IV, A, 3, dealing with uniform Bill of Lading and Seals, and Section VII, dealing with Complaints provide adequate guidelines to handle the situation. The delegates approved the recommendation.\n\nProblem 6 asked for methods for identifying the manufacturer of single-service containers. The task force stated that the Public Health Service report on this subject as presented to the Conference provides\nfor adequate means of identifying the manufacturer. The delegates approved the recommendation.\n\nTask force on responsibilities of the PHS\n\nThis task force was given five problems. Problem 1 asked the PHS to consider establishing an advisory committee composed of experienced survey officers to review and revise Bulletin No. 678 to place greater emphasis on enforcement procedure evaluation. The task force recommended that the PHS review and update Bulletin No. 678, \"Methods of Making Sanitation Rating of Milk Sheds, 1966 Edition\" as soon as possible so as to reflect current conditions. The delegates approved this recommendation.\n\nProblem 2 requested that new survey officers be accredited by a written or an oral examination along with an evaluation. The task force recommended no action on this request. The recommendation was approved by the delegates.\n\nProblem 3 asked that recertification of survey officers be conducted simultaneously with spot checks. The task force felt that present procedures already allow for this and, therefore, recommended no action. The delegates approved. Problem 4 recommend that PHS establish bacteriological procedures and standards for co-mingled raw milk prior to its entrance into a milk plant. The task force recommended no action and the decision was approved by the delegates.\n\nProblem 5 asked that the PHS be encouraged to carry on adequate training of survey officers in certifying single-service manufacturing plants. The task force felt that steps for adequate training have already been taken and therefore recommended no action. This decision was approved by the delegates.\n\nTask force on procedures for handling complaints and challenges of validity of ratings\n\nThis task force was given two problems. The task force recommended that the IMS Conference require, by July 1, 1973, the delisting of all shippers from the IMS list from any state or municipality which does not have reciprocal inspection agreements or does not abide by the Conference Agreements for all IMS rated supplies, and it further recommended that the IMS Executive Board refer this matter to the proper task force for implementation. James Smathers presented a minority report concerning the above mentioned recommendation stating that the industry should not be penalized for conditions over which it had no control. After considerable discussion, the recommendation was tabled until the report of Task Force 8 could be presented. After the completion of the report of Task Force 8, the above mentioned task force recommendation was voted upon and defeated by the delegates by a vote of 35-7.\n\nThe task force recommended that the IMS Conference require, by July 1, 1973, the delisting of all shippers from the IMS list from any state or municipality which does not accept the accreditation program for brucellosis and tuberculosis as outlined in the U. S. Public Health Service Grade A Pasteurized Milk Ordinance, 1965 Recommendation. It further recommended that the IMS Executive Board refer this matter to the proper task force or to a special committee for implementation. This recommendation was tabled until after the report of Task Force 8 was presented. It was then formally voted upon and defeated by a vote of 40.5 to 1.5.\n\nTask force on application of conference agreements and special problems\n\nThis task force was given five problems. Problem 1 recommended that the PHS update the Frozen Dessert Ordinance and make it a standard under Conference Agreements. The task force recommended no action and the delegates concurred. Problem 2 asked that consideration be given to including aseptically packaged milk and cream under the scope of the Conference. Sam Noles moved that the recommendation be amended as follows: \"That the Conference request the PHS to develop definitions and standards for production, processing, ultra-high temperature treatment, and aseptic packaging of sterilized or sterile milk and milk products.\" The amended motion was passed with only two negative votes.\n\nProblem 3: Recommend to the PHS that \"Acceptable Enforcement Rating\" be deleted from Section II of the PMO. The task force recommended that this change not be made. The delegates approved the recommendation. Problem 4 recommended that the wording in Section VIII, A.1 of the \"Procedures\" be changed to read,\" . . . shall apply to raw milk for pasteurization and to pasteurized milk and milk products.\" The task force recommended that the \"Procedures\" be changed accordingly so that the entire section involved reads: \"Section VIII, Application of Conference Agreements. A. Products Covered. 1. Agreement...\"\n\nThe delegates approved the recommendation. Problem 5 asked for ways to eliminate duplicate inspection, including the possible formation of a study committee. The task force recommended that the Conference chairman appoint an operating committee of five charged with the responsibility of receiving reports of lack of reciprocity, investigating such reports and taking, in respect to the facts determined, warranted action within the powers of the Conference Agreements, that the financing of the\ncommittee's expenses be arranged by the Executive Board of the Conference and finally that the committee submit to the 1971 Conference a resume of its functions with recommendations. After considerable discussion by the delegates Sam Noles proposed to amend the recommendation by striking out the words \"that the financing of the committee's expenses be arranged by the Executive Board of the Conference.\" The amended motion was unanimously accepted by the delegates.\n\nAfter the conclusion of the task force reports, Chairman Johnson called for any unfinished business. Dr. Richard Parry of Connecticut recommended that the Committee for Single-Service Containers be continued. His recommendation was approved by the delegates. Chairman Johnson then announced that the 1971 Conference will be held at the Chase-Park Plaza Hotel, St. Louis, Missouri, May 16-20. The final general session of the 12th meeting of the National Conference adjourned at 11:45 a.m., Thursday, May 29, 1969.\n\nREPORT OF COMMITTEE\n\n(Continued from Page 289)\n\nChairman J. Marion Johnson introduced the new members of the Board from Region I, namely Sam Rich, Bill Arledge, Wendell Carr, and E. Marion Caussey.\n\nEach member of the Board received a list showing the various hotels which had submitted proposals to host the 1973 meeting. After a considerable discussion, the meeting was awarded to the Savery Hotel, Des Moines, Iowa. The exact dates will be arranged later.\n\nChairman Johnson then called for the election of new officers. Both Chairman Shelby Johnson and Secretary-Treasurer J. C. McCaffrey were unanimously re-elected to their respective offices.\n\nIt was decided to hold an interim board meeting at Louisville, Kentucky, during the meeting of the International Association of Milk, Food, and Environmental Sanitarians, Inc., the time to be determined by the Chairman.\n\nChairman Johnson appointed John Schilling to serve as Local Arrangements Chairman for the 1971 meeting which is scheduled to be held at the Chase-Park Plaza Hotel, St. Louis, May 16-20.\n\nThere being no further business, the meeting was adjourned at 1:35 p.m.\n\nIn accordance with the instruction given the Committee in 1967 by the Conference the \"Committee on Scope\" respectfully submits this report. It will be presented at the business session on Thursday on the question of its adoption.\n\nHarold J. Barnum, Co-Chairman\nClarence K. Luchterhand, Co-Chairman\n\nSummary of Recommendations\nSubcommittee on Available Procedures and Standards\n\nExisting standards and model regulations for products not included in the Pasteurized Milk Ordinance were studied by this subcommittee. Some of the subcommittee recommendations have been incorporated into the main body of this report. Additional recommendations by the subcommittee include:\n\n1. All products covered by the provisions of the Agreement should be supervised and coordinated by the state and federal agencies which are presently operating the program.\n\n2. Where applicable products should bear the plant identification number as outlined by the recommendations of the National Labeling Committee.\n\n3. The committee considers the framework for determining sanitation compliance ratings of sources already existing within the provisions of the Conference agreements. Should the inclusion of other dairy products within the provisions of the agreement materialize, federal agencies could establish a numerical evaluation for sanitation items.\n\nSummary of Recommendations\nSubcommittee on Need for Uniformity and Reciprocity\n\nThis subcommittee was assigned the task of gathering in-\nTHE ROLE OF AN INDUSTRY SANITATION CONSULTANT IN FOOD PLANT SAN", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": " Such an analysis could reveal that fewer barriers exist than are currently perceived.\n\nWhere to start?\n\nIt can be overwhelming to see this long list of barriers and think: There is too much in our way – we’ll never achieve transformation! After the dialogues were completed, the research team identified two initial steps can make the task of dismantling barriers more manageable.\n\nFirst, the barriers can be narrowed by only focusing on those found to block progress toward several food system changes. In other words, the 14 barriers presented in Figure 1 now become the focus of analysis. This can be a useful step since a combination of changes will likely be needed to transform to sustainable food systems, and these 14 barriers represented roadblocks to a range of changes.\n\nSecond, the barriers can be reframed into leverage points – or places in a system where intervention can result in changes to that system and prioritise those with the most leverage for systemic, transformative change. The potential of leverage points to effect systems change can be scored on a continuum. On one end are those interventions – termed ‘shallow’ leverage points – that are relatively easy to implement yet have limited potential for transformative change. This could be an intervention such as creating an infrastructure for centralised, harmonised database for food system information. For example, digital infrastructure like the Food Systems Dashboard could be expanded and adapted for detailed data collected at the Nordic level. At the other end of the continuum are those interventions – termed ‘deep’ leverage points – that require more time, resources and effort, but have the potential to unlock transformative change (Figure 2 next page). An example would be adopting a mindset where sustainable diets are a public right.\n\nIn between on the continuum, there are what are referred to here as ‘promising’ leverage points. These make important steps in changing the fundamental functioning of food systems by changing the design of a system or information flows. One example could be designing food systems in a more circular way.\n\nSince the Nordics have already begun tackling many of the ‘low-hanging fruits’ – the shallow leverage points – this Insight Paper focuses on deep and promising leverage points that can lead to transformational change. From here, the list of 14 barriers identified in Step 1 can be narrowed even further to identify seven critical leverage points.\n\nDeep leverage points: Goals, mindsets and paradigms\n\nDeep leverage points are powerful because they target changes to the goals of the system, the mindsets of individuals who shape the system, and the paradigms that guide decision-making about the system. Several barriers discussed in the dialogues identified different goals, mindsets, values and paradigms as blockages to systems change. Below, these barriers have been reframed as deep leverage points for changing Nordic food systems.\n\nSecuring political support will require that the mindsets and goals of policy-makers change. Demonstrating political will and leadership are key aspects of political support. Strong thought leadership is also key to empower others to associate change with opportunity rather than risk.\n\nChanging food culture will mean creating a new ‘cultural paradigm’ that steers our eating habits in a more sustainable direction. This also includes involving a diverse set of actors to co-create guiding principles (not dogmas) that lay the foundation of this new paradigm.\n\nManaging vested interests will start from the recognition that all actors have interests and goals as well as differing levels of power and influence over food system change. Conflicting interests need to be brought to light and resolved.\n\nChanging individuals’ mindsets will require us to find new ways to change individuals’ preferences, beliefs, values and lifestyle choices related to food.\nPromising leverage points: System design and information flows\n\nWhile unlocking deep leverage points would be powerful in affecting change, there are other leverage points – which are referred to here as promising leverage points – that hold slightly less, but still significant transformative potential. Promising leverage points target the design of a system and the information flows within that system. In the Nordics, the following examples illustrate promising leverage points:\n\n- **Increasing individual knowledge and cooking skills about sustainable diets** can be achieved by improving credible information flows through many channels, including formal education, higher education of health care professionals, advertising and public campaigns.\n\n- **Improving food environments** – the physical, social, economic and cultural spaces that shape our food-related behaviour – can be a way to significantly change the design of the food system and the influence the food system has on our individual choices. This includes food labelling, marketing and the affordability and accessibility of food.\n\n- **Creating ambitious policies that support sustainable food futures** is another way to significantly shape the design and purpose of a food system. This includes creating safe spaces where new approaches can be tried and tested.\n\n\n\n**Figure 2**: Activating deep leverage points (changing goals, mindsets, and paradigms) can help overcome system lock-ins and transform current food systems into desired food systems. Yet there are also promising leverage points (changing system design and information flows) that can move us closer to sustainable transformations. Other shallow leverage points (changing the infrastructure, parameters or feedback loops of a system) are not discussed here. Figure adapted from the leverage point approach literature. Figure by Azote.\n\nWorking together to activate leverage points\n\nLooking at the seven leverage points discussed above, it is clear that there is no simple way to activate each leverage point. For example, to change food culture, several factors within the food system might need to change, such as guidance from the public sector in setting new norms related to food; involvement of chefs and other food influencers to bring the concepts of sustainability onto a plate in a tasty, attractive way; and work from food business and retailers to produce and stock new types of ingredients, foods and meals.\n\nAdopting a food systems approach – one that looks at the food system as a whole and appreciates the linkages between and feedbacks among parts of the system – will be critical. Only with systems thinking can we understand the multiple drivers that create and reinforce food system barriers.\n\nOne way to encourage systems thinking is through collaboration of actors across the food system. Working together will allow actors to get the most transformative potential out of each leverage point. Below (Table 2), ten collaborations are proposed that can help activate each leverage point. These collaboration ideas were developed after the dialogues by the research team. It is important to\nnote that while these collaboration ideas are evidence-based, the effectiveness of each collaboration will only be known if societies have the courage to test them out. Crucial to this experimentation is the willingness to learn from successes as well as from failures. This is not a one-time process. Support for an iterative, active learning process needs to be in place.\n\nWhile the collaborations presented below use a single leverage point as an entry point for change, the collaborations end up activating multiple leverage points. For example, by working to change current food environments, collaborators would also likely help to create policies that support sustainable food futures, increase individuals’ knowledge and change food culture. Thus, investing in one leverage point is likely to have positive ripple effects across other leverage points.\n\nTable 2. Potential collaborations to activate deep and promising leverage points in Nordic food systems.\n\n
\n\n
\n
Leverage points and potential collaborations
\n
Examples of core collaborators
\n
Potential actions
\n
Linkages to other leverage points
\n
\n\n\n
\n
Secure political support
\n
\n
\n
\n
\n
\n
Collaboration 1: Develop food systems goals and indicators
\n
• All national and local government departments
\n
Clear goals for sustainable food systems can be set by local and national governments. Formal goals will help prioritise and accelerate action on food system change, providing a clear direction of change and indicating the necessary level of ambition. Indicators should also be developed to assist in the monitoring and evaluation of action. A mechanism should be established to ensure that the best available scientific evidence is regularly used to inform food system goals and indicators.*
Collaboration 2: Co-develop a national and regional food identity
\n
• Tourism authorities • Citizens • Food service professionals • Civil society organisations • City planners • National food authorities • National education authorities • Private sector (including small- and medium-scale enterprises, SMEs) • Governments
\n
Over the past 17 years, food culture has rapidly evolved in the Nordic region, sparked by the New Nordic Food Movement. The concept of modern Nordic food continues to evolve. Domestic tourism authorities can adapt their strategies to promote sustainable food systems as destinations, experiences and as a component of a desirable lifestyle. Civil society, food service professionals, national authorities and city planners can include (where not already existent) food education and educational spaces that engage not only school-age children but also families and the community at large. The private sector and governments can provide innovation spaces to support entrepreneurs in filling gaps in the market as societal needs change. Citizens and governments can revisit and revise national and regional food-related manifestos, without becoming dogmatic.
\n\n* Many research projects across the Nordics are aiming to develop food system goals. In Sweden, for example, the Mistra Food Futures program is developing food system targets and indicators, which could then be fed into the public sector process for setting national food system goals.\n### Leverage points and potential collaborations\n\n
\n\n
\n
Manage vested", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": "8” pan to heat: \n4 c. canned sliced peaches (or other fruit) \nAdd: \n1 tsp. cinnamon or nutmeg \n2 Tbsp. sugar \nPour on: \n9 oz. white cake mix prepared as directed \nor 2 c. Bisquick and juice from fruit to make dumplings\n\nCover and bake 20-30 min. Serve with whipped topping.\n\n**Fruit Crisp**\n\nPour: \n21 oz. can fruit pie filling in bottom of Dutch oven or 8” pan to heat. \nTop with: \n9 oz. white cake mix (dry) with ¼ c. margarine worked in w/fingers. \nor 9 oz. pie crust mix (dry) with ¾ c. brown sugar worked in\n\nCover and bake 20-30 min. or until topping is brown.\n\n**Hillbilly Cobbler**\n\n1 stick margarine \n1 c. sugar \n2/3 c. milk \n1 c. flour \n2 tsp. baking powder \nYour choice of 1 can pie filling, 21 oz. size\n\nMelt ½ stick of margarine in each of two 8” or 9” cake pans. In a separate bowl, mix the flour, sugar, baking powder and milk. Pour ½ of the batter into each of the two cake pans. Pour ½ can of pie filling over each pan of batter. DO NOT STIR! Bake at 350° for 35 minutes or until lightly browned. These pans will stack perfectly in one 12” Dutch oven. Use two clean wire tent stakes on the bottom pan to maintain separation between pans.\nPineapple Upside Down Cake\n\n1 can sliced pineapple \n½ c. brown sugar, packed firmly\n¼ c. butter \n2 pkg. yellow cake mix\nadditional ingredients necessary for cake mix\nMaraschino cherries, drained (optional)\n\nLine the oven with aluminum foil. Place oven on heat, level it, and melt the butter in the oven. When melted, add the brown sugar, then the pineapple slices (drain them first) with a cherry in the center of each slice. While butter is melting, mix the cake according to package directions. Pour the cake mix over the glaze and put lid on pan. Bake in coals about 25 minutes, until golden brown and cake tests done. Lift out of pan by edges of aluminum foil and invert onto plate. Remove foil. Serves 12.\n\nVARIATION:\n- Instead of yellow cake mix, use 1½ pkg. Pound cake mix, 3 large eggs, 1 ¼ c. milk\n- Pour: 20 oz. can crushed pineapple in bottom of Dutch oven or 8” pan to heat. Pour on: 9 oz. white cake mix prepared as directed. Cover and bake for 20-30 min.<|endoftext|>Tofu Tacos\n\nSource: Healthy Eating for Life for Women by Kristine Kieswer; recipe by Jennifer Raymond, MS, RD\n\nThese tacos can be made with fresh or frozen tofu. The frozen tofu gives it a texture similar to ground beef. To freeze the tofu, put the whole package in the freezer. Defrost it in the refrigerator. Once thawed, remove the tofu from its package and squeeze out the excess water.\n\nAbout the Recipe\n\n118 Calories · 5.7 g Protein · 3.2 g Fiber\nDinner\n\nIngredients\n\n*Makes 6 Servings*\n\n- 1 small onion, chopped\n- 1/2 small bell pepper, seeded and cut into cubes (optional)\n- 8.8 oz (249 g) firm tofu, crumbled\n- 3 tsp (15 mL) chili powder\n- 1 tbsp (15 mL) nutritional yeast (optional)\n- 1 tsp (5 mL) garlic powder\n- 1/4 tsp (1.2 mL) ground cumin\n- 1/4 tsp (1.2 mL) dried oregano\n- 1 tbsp (15 mL) reduced-sodium soy sauce\n- 6 corn tortillas\n- 1 head romaine lettuce, chopped\n- 2 green onions, chopped\n- 1/2 c (76 g) tomato, diced\n- 1/3 c (86 mL) salsa\n- 1/2 avocado, sliced (optional)\n\nDirections\n1. Heat 1/4 c (60 mL) water (or low-sodium vegetable stock) in a nonstick pan. Add the onion and bell pepper and cook over high heat, stirring often, between 2 and 3 minutes.\n2. Add tofu, chili powder, nutritional yeast (if using), garlic powder, cumin, oregano, and soy sauce. Reduce heat to medium and cook for 3 minutes, stirring often.\n3. Heat a tortilla in a dry heavy pan, turning it from side to side until it is soft and flexible.\n4. Place a small amount of tofu mixture in the center, then fold the tortilla in half and remove from heat.\n5. Garnish with lettuce, green onions, tomato, salsa, and avocado, if using. Repeat with each remaining tortilla.\n\n**Nutrition Facts**\n\nPer taco:\n\nCalories: 118\nFats: 4.1 g\n - Saturated Fat: 0.7 g\n - Calories From Fat: 31.4%\nCholesterol: 0 mg\nProtein: 5.7 g\nCarbohydrate: 16.9 g\nSugar: 2.8 g\nFiber: 3.2 g\nSodium: 321 mg\nCalcium: 116 mg\nIron: 1.6 mg\nVitamin C: 10 mg\nBeta-Carotene: 371 mcg\nVitamin E: 1.1 mg<|endoftext|>Keegan-Michael Key\nGets Serious\n\nFrench Revolutions\nCycling a stage of the Tour de France\n\nTasty Stays\nThe world's most delicious new hotels\n\nSneakers and spritzes for summer\nThe World’s Most Delicious New Hotels\n\nHotel dining used to mean room-service club sandwiches and limp iceberg lettuce salads at the brightly lit lobby bar. Not anymore. Now, the best meals to be had on the road—from Berlin to Brooklyn—are an elevator ride away.\nThe Dewberry\nCHARLESTON, SOUTH CAROLINA\n\nThe Dewberry opened its doors last July, immediately becoming the place to stay in Charleston thanks to its luxe yet refined Mid-Century Modern design, central location, and, most important, its Dixie-inflected French restaurant, Henrietta’s (which is saying a lot, considering what a foodie destination Chucktown is). Waiters in white jackets whisk out plates of steak frites and flounder meunière in the airy dining room, but the must-order dish is a mere “for the table” starter: gougerès with chicken liver mousse. These buttery, Gruyère-laden yet surprisingly light puffs of pastry are as French as you can get, but executive chef R.J. Dye drew from his own Southern history for Henrietta’s presentation. “We serve the warm gougerès in the same manner that steaming hot baskets of buttermilk biscuits were delivered to the table by my grandmother,” he says. But rather than wrapping them in a tea towel, he nestles the puffs in an elegant ceramic dish with a slate top that he decorates with a swipe of chicken liver mousse, a totally rich and over-the-top accompaniment that is nonetheless absolutely necessary. He finishes with a bit more Southern flair: a sprinkling of toasted benne seeds, a cousin of the sesame seed that has deep Low Country roots. Dye says he adds them not for the history but for the taste: “The subtle nutty and earthy flavor profile keeps the gougerès grounded.” Whatever the reason, you’ll want a second order. –EC<|endoftext|>The Importance of Food Labelling\n\n25 August 2010\n\nEnsuring food safety is a shared responsibility between governments, producers, industry and consumers. Food labelling is one way in which consumers can get knowledge about the food they consider buying. Correctly following the information provided on food labels (such as expiry dates, handling instructions and allergy warnings) can help consumers prevent unnecessary food-borne illness and allergic reactions.\n\nExpiry dates\n\nIn the European Union (EU), an intricate set of legislation and standards has been developed and implemented to ensure safety throughout the entire food chain. Perishable foods, judged from a microbiological point of view (such as cooked meat products, prepared foods and salads), display a 'use by' date on the package and should not be eaten after this date, as this could present a health risk. In addition, many foods display a 'best before' date, which gives an indication of the “minimum durability”, or the period during which the food retains its specific properties when properly stored. In other words, a product whose “best before” date has expired may still be safe to eat, but the manufacturer no longer guarantees the sensory properties of the product (e.g. taste, smell, appearance etc).\n\nIn a recent nationally representative survey from the UK, only half (49%) of the over 3000 respondents correctly identified the ‘use by’ date as the best measure of safety and 47% said they would never eat cooked meat beyond its ‘use by’ date. Most respondents were found to be using expiry dates as a point of reference and relying on their own judgement to decide if the food was safe to eat by smelling it (74%) or by just looking at the food (65%). In a nationally representative study from Ireland (", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": "Implementing the strategy and measuring progress\n\nHow the FSA will implement its 5-year strategy and measure progress in priority areas.\n\nThis strategy sets our direction for the next five years. We expect our organisation and our work to evolve to meet the ambitions we have set out.\n\nWe will need to be flexible in our approach, particularly as we explore new areas of our strategy such as our vision for food that is healthier and more sustainable.\n\nWe are setting our corporate objectives and work plan for the first year alongside this strategy and will set work plans for subsequent years through our corporate planning process. We will discuss these at public Board meetings. We will also work with external stakeholders to inform work planning, as part of our commitment to work with and through others.\n\nWe know from the last five years with EU exit and the COVID-19 pandemic that our context can change significantly. But we expect this strategy to provide the framework with which to face those changes: clarity about our vision, our objectives, and how we are going to do our work.\n\nHaving set out our strategy, we will need to make sure that the FSA has the capacity and capability to deliver on it. We will include in our work plans some internal pieces of work that help us to build that resource, and to ensure that the guiding principles are fully embedded in the FSA.\n\nOur people plan\n\nWe are developing a new people plan to enable us to deliver on our strategy. Its focus will be on maximising organisational capability, living our values, ensuring an excellent employee experience and growing and developing our people.\n\nServices approach\n\nWe believe it is important to see some of our work as a ‘service’ for the public, industry, local authorities or other parts of government. We have applied a service design approach to our digital services for some time but are now expanding this into other areas of our organisation. This will include increasing the amount of feedback we receive on our work, establishing and monitoring performance metrics and redesigning some of our processes to work more smoothly. Through this process we aim to make it easier for businesses to meet their obligations and do the right thing.\n\nMeasuring progress\n\nExisting measures\n\nThe food system is incredibly complex. To measure the successful delivery of our strategy, we will need to consider a range of metrics acknowledging the complexity involved in measuring progress in the food system.\nThere are also many actors, including the FSA, with different roles and responsibilities to make food safe, what it says it is and healthy and sustainable. This means we will need to look at progress from several angles.\n\nThe FSA has a performance reporting system with a cascade of metrics and targets, from our top-level strategic objectives down to the daily activities of our frontline work. We publish performance data on a regular basis, for example in performance and resources reports to the FSA Board’s Business Committee.\n\nWe plan to evolve this performance reporting system and use it to measure progress against our new strategy.\n\nMany of the existing measures already align with our new strategy including on whether food is safe and food is what it says it is.\n\nFor example, relating to our vision that food is safe, we publish figures for the number of laboratory confirmed cases of the ‘big four’ food pathogens. These are the number of cases, confirmed by laboratory tests, of four of the main sources of foodborne illness – E. Coli, Salmonella, Campylobacter and Listeria. This allows us to measure an outcome in the food system we want to see - that cases remain low.\n\nLab confirmed cases of ‘Big 4’ food pathogens (000s)\n\nWe regularly measure consumer perspectives on the food system and of the FSA:\n\nPercentage of consumers who are confident in food safety and authenticity\nWe also publish measures of the contribution the FSA and others in the food system make to achieving these outcomes.\n\nFor example, we report on the percentage of Food Business Operators (FBOs) achieving FHRS ratings of five (meaning very good) and those receiving a rating below three (meaning below satisfactory). We also report on the percentage of meat FBOs who are rated as satisfactory or above for compliance and audit activity.\n\n**Percentage of businesses achieving FHRS score five (very good)**\n\n**Percentage of meat businesses audited rated 'good'**\nThese measures continue to represent a picture of the performance of the FSA and the food system as a whole and provide a useful baseline to measure progress against.\n\n**Updated and new measures**\n\nWe will develop new metrics and revise our performance reporting to fit this new strategy.\n\nTo effectively evaluate our strategy, our metrics will go from ‘end-to-end’, so we have numbers for own our activities and outputs, for how the food system overall is doing and how those join together so we can assess our particular contribution:\n\n- Developing and improving measures covering our core role in food that is safe and food is what it says it is.\n- Incorporating the right set of measures to understand progress in the area of food that is healthier and more sustainable (building on existing nutrition measures we use in Northern Ireland).\n- Incorporating measures relevant to protecting wider consumer interests in food, such as food insecurity and affordability.\n- Expanding the measures relating to how we are embedding our principles, for example measures of FSA service delivery such as user feedback, or how long it takes us to perform certain actions.\n- Tracking the benefits we have delivered in areas covered by our strategy, for example what corporate plan milestones have we reached and what impact we can demonstrate for consumers (either as forecasts or retrospective evaluations).\n\nUltimately this strategy is all about delivering food you can trust for consumers. By using a robust and varied set of measures to track delivery and impact over the next five years, we will be able to adjust our approach where needed, deal with change, and ultimately be sure that everyone has food that is safe, is what it says it is, and is healthier and more sustainable.<|endoftext|>Food Allergens: A Comprehensive Approach For Food Processors To Prevent Unintended Allergens In Their Foodstuffs\n\n- Dairy\n- Egg\n- Crustacean Shellfish\n- Fish\n- Tree Nuts\n- Wheat\n- Peanuts\n- Soybeans\n\nA Food Safety Guide for Food Processors\n\nEHA\nContents\n\nChapter 1: Introduction p.3\n\nChapter 2: Allergens and Food Processors p.4\n\nChapter 3: Food Processors’ Allergen Challenges p.5\n\nChapter 4: Major Risk Areas for Allergen Recalls p.6\n\nPart 1. Controls\n\nA. Product Intake Handling\nB. Allergen Identification\nC. Storage\nD. Cross-Contamination\nE. Product Matrix\nF. Labeling\n i. US Government Regulations\n ii. International Regulations\n iii. Label Allergens\nG. Proper Sanitation\n i. Cleaning Methods\n ii. Inspection\nH. Testing Allergens\n i. Actions That Have To Be Taken\n\nPart 2. Employee Training\n\nChapter 5: Moving Forward p.16\n\nPart 1. Processor\nPart 2. Customers\n\nChapter 6: How EHA Consulting Group, Inc. Can Help p.17\n\nAbout EHA Consulting Group Inc.\n\nEHA Consulting Group, Inc. (EHA) offers comprehensive public health consulting, epidemiology and food safety services before, during and after a crisis. We provide these services to Retail Food, Food Service, Food Processing, and Contract Food Service Management companies.\n\nNeed our Services? Call us today at 800-969-1441.\n\nVisit us at www.ehagroup.com. Follow us on Twitter @EHAConsultingGp.\nIntroduction\n\n“The proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.”\n\nThe proper control of food allergens in a food processing plant presents numerous challenges. The ubiquitous presence of allergens in the human food supply, coupled with increased awareness of food allergies, warrants undertaking appropriate preventive measures to protect sensitive consumers from unwanted exposure to offending food allergens. Food processors must have an allergen prevention plan to determine potential sources of contaminating allergens and create appropriate controls to prevent allergen introduction into food products.\n\nThe following guide from EHA Consulting Group, Inc. (EHA) contains information, best practices, and tools for a food processing company to avoid allergen-related recalls. Key factors in allergen control include poor identification, poor handling, poor storage, improper product matrix, improper labeling, poor sanitization, and inadequate testing. The purpose of this guide is to educate you and your staff on the proper steps to protect your brand and your business from the negative ramifications of an allergens incident and potential recall.\nAllergens and Food Processors\n\n“Up to 15 million Americans have food allergies, 1 in every 13 children under the age of 18.”\n\nWhen it comes to food allergens, what you don’t know could hurt you - as a customer and as a business owner. Up to 15 million Americans have food allergies, including one in every 13 children under the age of 18. Ensuring that a large number of potential customers can safely consume your food is a vital business practice.\n\nAllergens affect people in various ways. Allergens are substances, usually protein in nature, that illicits a reaction that is generically termed an allergic reaction. Allergens do not have to be proteins; they can be chemical, such as sodium bisulfite or MSG (monosodium glutamate) and in non-food settings, they can be dust. Food allergens are an improper reaction of someone’s immune system that most of", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-food_and_dining", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-food_and_dining/part-00-00000.npy", "text": " surface of the storage and dispensing portion is shaped substantially like the inner surface of a drinking cup.\n\n[0018] In still other preferred embodiments, the storage and dispensing portion is cooperative with a sealing cap.\nIn other preferred embodiments, the storage and dispensing portion is shaped so as to accommodate storage of a closed cylindrical container.\n\nIn yet more preferred embodiments, the storage and dispensing portion includes a plurality of drinking cups.\n\nIn still more preferred embodiments, the drinking cups each bear a trademark.\n\nAnother general aspect of the invention is a bottle for containing a beverage, and for storing and dispensing cups useful for consuming the beverage. The bottle includes a cup storage and dispensing portion formed into a surface of the bottle, an inner surface of the cup storage and dispensing portion including a cup retaining element capable of resisting removal of a cup from the cup storage and dispensing portion. The bottle also includes a plurality of cups stored within the cup storage and dispensing portion.\n\nIn preferred embodiments, the cup storage and dispensing portion is formed into a bottom of the bottle. In other preferred embodiments, the cup storage and dispensing portion is formed into a side wall of the bottle.\n\nIn still other preferred embodiments, the cup storage and dispensing portion is sealed by a cap.\n\nIn further preferred embodiments, the cup storage and dispensing portion is shaped to accommodate a cup, while maximizing the volume of the bottle.\n\nIn still further preferred embodiments, the bottle also includes at least one sample within the cup storage and dispensing portion.\n\nIn other preferred embodiments, the cup retaining element, capable of resisting removal of a cup from the cup storage and dispensing portion, includes a plurality of resistance regions.\n\nIn still other preferred embodiments, the resistance regions are circumferentially disposed.\n\nIn preferred embodiments, the cup retaining element is formed from a wall of the cup storage and dispensing portion.\n\nAnother general aspect of the invention is a method of providing promotional items with drink containers. The method includes providing a drink container with integral storage formed into a wall of the container, the storage forming an externally accessible cavity extending into the drink container. Then, placing one or more promotional items within the externally accessible cavity, and sealing the promotional items within the externally accessible cavity with a removable lid.\n\nFIG. 5 is a cut-away view of an alternate preferred embodiment of the invention storing promotional items.\n\nDETAILED DESCRIPTION OF PREFERRED EMBODIMENTS\n\nFIG. 1 shows a cut-away perspective view of the drink storage and dispenser portion of a preferred embodiment of the invention with details of key features and elements. This portion of the preferred embodiment of the invention includes concentric cylinders joined at the top with the inner cylinder closed at the bottom. The shape of it is essentially that of a sleeve that can accept a plurality of cups within the sleeve such that only the bottom surface of the last cup inserted into the sleeve is exposed.\n\nThe storage and dispenser portion of the invention in this embodiment includes two cylinders, an outer cylinder 120 and an inner cylinder 130 which is smaller in diameter and shorter in length than outer cylinder 120. Additionally, the inner cylinder 130 has a closed end 140. The inner cylinder 130 is located concentrically within the outer cylinder 120 such that the open end of inner cylinder 130 is aligned yet opposed with respect to an open end of outer cylinder 120. The aligned open ends of the cylinders 120, 130 are attached by an annular seal 110 to maintain the cylinders 120, 130 in stable relative position, and to close off one end of the space between the cylinders, thereby creating a storage space 150 between cylinders, thereby providing space for a plurality of stacked drinking cups. A circumferential retaining ridge 160 provides a barrier that resists removal of each of the cups, as explained further below.\n\nFIG. 2 shows a cut away view of a preferred embodiment of the invention where the bottom of a large beverage container, such as a soda bottle, includes a storage and dispensing portion 100. The storage and dispensing portion 100 of FIG. 2 is very similar to the structure described in FIG. 1, differing only in the relative slant of the cylinder walls, and that the plastic is formed as a continuous structure that is integral to the wall 210 which descends to form the bottom of the large beverage container 220, which includes the storage and dispensing portion 100. FIG. 2 also shows a cross-sectional view of a circumferential retaining ridge 160, which is essentially the same as the circumferential retaining ridge 160 of FIG. 1. This storage and dispensing portion 100 of the large beverage container 220 can accept a plurality of cups that can each be inserted by a person or by a machine situated outside the large beverage container 220.\n\nThe storage and dispensing portion 100 of the invention is made from the same material used to make standard beverage containers. For example, in the case of a two-liter soft drink container, the invention is made from PET plastic, which is relatively hard and transparent. In the case of a one-half or one gallon milk container, the invention is made from partially translucent or opaque plastic. The invention can also be made from glass, such as when included in the bottom or the side of a large glass milk jug. The invention could also be included in the side or the bottom of a very large plastic water cooler bottle, for example.\n\nThe storage and dispensing portion 100 can store and dispense a plurality of cups, each cup having a cup rim 260 sized to lightly contact the inner wall of the storage and dispensing portion 100. When a cup is moved past the circumferential retaining ridge 160 to add or remove a cup from the portion 100, it applies a compression force to a cup rim 260, temporarily deforming it slightly, as it moves past ridge.\nThe force applied to cup rim 260 is sufficient to prevent the cup 230 from falling out of the storage and dispenser portion 100 under its own weight, but is not enough to permanently deform the cup rim 260. Retaining ridge 160 can be a continuous structure, or it can be a plurality of segments interspersed with voids along the inner circumference of outer ring 120 so as to reduce the compression force on cup rim 260.\n\nFIG. 3 also displays how the invention takes advantage of the fact that drinking cups 230 can be stacked to provide maximum drinking cup storage with minimum volume being taken away from the interior volume of a drink container.\n\nTo keep drinking cups 230 from being exposed to dirt and germs outside the drink container, a lid 310 can be placed over the open end of cup storage portion 100. The lid 310 can be constructed and attached in a way similar to the plastic or foil-backed lids used to seal many liquid storage containers. These peel-off, single use lids provide protection to the contents during manufacture, distribution, and retail handling. Alternatively, the lid 310 can be made of rigid plastic, and formed in the shape of a thin stopper to allow the lid 310 to be reusable.\n\nWith reference to FIG. 4, the storage and retaining portion 100 of the invention can be formed into any wall of a drink container. FIG. 4 shows a side-wall embodiment of the invention integrated into the side wall of a plastic bottle or glass jug.\n\nFIG. 4 also shows an alternative embodiment of the invention without an inner wall similar to the inner cylinder 130. Instead, there is only an outer wall similar to the outer cylinder 120, and a flat back wall 410 instead of a cup-like wall 332. This embodiment provides storage for drinking cups, as well as anything else that one might want to include inside the inner-most cup, such as packets of sugar, drink flavoring, or collapsible drinking straws, for example. However, this embodiment also takes up a larger volume from drink container interior 220 than the other embodiments described herein.\n\nFIG. 5 shows an alternate embodiment of the invention with storage and dispenser portion 100, which can be accessed by removing lid 310. The storage and dispenser portion 100 here is shown NOT storing cups, but instead being used for storage of promotional items such as game cards, key rings, a coupon 510, or a product sample 520, as the manufacturer or bottler may choose to provide. Thus, the shape of storage and dispenser portion 100 could be other than cup-shaped, and could therefore be smaller or larger than a set of cups so as to accept such promotional items. In this embodiment, storage portion 100 could be used by the retail consumer to store an item or items of their choosing such as non perishable food.\n\nAlternatively, storage portion 100 could be used to store a different drink in its own small container, a trial sample 520 of a complimentary food, or other item offered by the manufacturer.\n\nStorage portion 100 could also accept similarly sized cups provided by the retail consumer, or another party, independent of the consumption of the drink container contents. In this way, the storage and dispenser portion of the invention can function solely as a cup storage and dispensing apparatus.\n\nOther modifications and implementations will occur to those skilled in the art without departing from the spirit and the scope of the invention as claimed. Accordingly, the above description is not intended to limit the invention except as indicated in the following claims", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": "FLOURESCENT LAMP\nNAME PLATE\nSPEAKER\nSTRIKE BUTTON\nPOWER SUPPLY SWITCH\n\n#DEMGNETIZING SWITCH\nSERVICE SOCKET\nCASH BOX\n\nCOIN BOX KEY\n\n#DEMGNETIZING SWITCH (Used only when correcting irregular colour when power switch is turned on.)\n\nSPECIFICATION\n\n
\n\n
\n
POWER SUPPLY
\n
AC100V - 240V (to be adjusted)
\n
\n\n\n
\n
POWER CONSUMPTION
\n
120W (AC100V)
\n
\n
\n
GAME COST
\n
ADJUSTABLE (REF. PAGE 3)
\n
\n
\n
DIMENSIONS
\n
W x D x H = 610 x 890 x 1700
\n
\n
\n
CASH BOX CAPACITY
\n
(2,200 coins of Yen ¥100.-)
\n
\n
\n
CRT
\n
20" Colour (monochro)
\n
\n\n
\n\nThese specifications may be changed without notice.\nAs the CRT used is the same as that in home TVs care must be taken to avoid damage during transportation and installation.\n\nAs this set is for indoor use do not install outdoors.\n\nAvoid places under direct sunlight and also avoid humid or dusty places.\n\nInstall on a solid level floor.\n\nLeave a suitable space around the machine to avoid obstruction during play and maintenance.\nBEFORE PLUGGING IN THE POWER CORD\n\nUSE THE DIP SWITCH TO SET YOUR MACHINE. IT IS LOCATED IN THE LOWER RIGHT AND ACCESSIBLE BY PULLING OUT PCB 1 AS SHOWN IN THE DIAGRAM.\n\nEXAMPLE SET AT TIME OF SHIPMENT\n\nSELECT YOUR COINAGE\nSELECT REPLAY POINTS\nREFER TO THE CHART FOR OTHER SETTINGS\n\nPLUG IN THE POWER CORD (ARRANGE THE CORD SO THAT IT IS OUT OF THE CUSTOMERS WAY). TURN THE POWER SWITCH ON.\n\nWHEN THE COLOUR IS IRREGULAR, PUSH THE DE MAGNETIZING SWITCH FOR 2 OR 3 SECONDS (SEE PAGES 1 & 9)\n\n
\n\n
\n
NO.
\n
SET
\n
FUNCTIONS
\n
\n\n\n
\n
1
\n
\n
FOR ADJUSTMENT
\n
\n
\n
2
\n
ON
\n
ON
\n
\n
\n
3
\n
ON
\n
OFF
\n
\n
\n
\n
1500
\n
3000
\n
\n
\n
4
\n
ON
\n
ON
\n
\n
\n
5
\n
ON
\n
OFF
\n
\n
\n
\n
3
\n
4
\n
\n\n
\n\nBONUS POINTS\n\nNUMBER OF HUNTERS\n\nGAME CHARGE\n\n
\n\n
\n
NO.
\n
SET
\n
FUNCTIONS
\n
\n
\n\n\n
\n
6
\n
ON
\n
ON
\n
OFF
\n
\n
\n
7
\n
ON
\n
OFF
\n
ON
\n
\n
\n
\n
1 coin
\n
1 coin
\n
2 coins
\n
\n
\n
8
\n
ON
\n
PREVENT
\n
\n
\n
\n
\n
OFF
\n
TURNING
\n
\n
\n
\n
\n
\n
GAME SCREEN
\n
\n
\n\n
\n\n
| | | |
\n
\n\n
\n
\n
\n
\n
\n\n
\nHOW TO PLAY\n\n1. INSERT COIN\n\n2. PUSH BUTTON ↓ FOR ONE PLAYER OR BUTTON ↓↓ FOR TWO PLAYERS AS DESIRED TO START.\n\n3. ONE MOLE HUNTER WILL TRAVEL AUTOMATICALLY TO THE TOP CENTER OF THE SCREEN AND UPON HIS ARRIVAL THE MOLES WILL BURROW UNDERGROUND. THE GAME STARTS.\n\n4. USE THE CONTROL LEVER TO MOVE THE HUNTER ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nWHEN THE MOLES EMERGE TO EAT, STRIKE THEM.\n\nTHE HIGHEST SCORE ACHIEVED WHILE THE MACHINE IS ON WILL BE REGISTERED.\n\nPARTNERS ↓↓ SCORE\n\nSINGLE PLAYERS ↓ SCORE\n\nPEANUT\n\nDOTTED LIGHTS SHOWING WHERE THE MOLES ARE BURROWING\n\nAFTER STRIKING A MOLE IT WILL RISE TO HEAVEN, LIKE THIS.\n\nGRAND FATHER MOLE. HE IS ALWAYS WAITING FOR A CHANCE TO BITE THE HUNTER SO THE HUNTER SHOULD APPROACH HIM FROM BEHIND\n\nNUMBER OF HUNTERS PER PLAY\n\nHALF EATEN PEANUT\n\nMOLE EATING A PEANUT\n\nBABY MOLE EMERGING\n5. IF THE HUNTER STRIKES THE\nGRANDFATHER, HE WILL RECEIVE\n50 POINTS BUT HE CANNOT KILL\nTHE GRANDFATHER UNTIL LAST\nONLY AFTER HE HAS DISPATCHED\nALL OF THE BABY MOLES.\n\n6. THE BABY MOLES CANNOT HURT THE\nHUNTER BUT THE GRANDFATHER\nCAN. IF THE GRANDFATHER DOES\nBITE THE HUNTER ANOTHER HUNTER\nWILL MOVE ON SCREEN TO TAKE\nHIS PLACE. HOWEVER IF THE\nFOURTH HUNTER IS BITEN, TWO\nCARRIERS WILL RUSH ON SCREEN\nAND CARRY HIM OFF.\n\n7. IF 2 PLAYERS ARE PLAYING AND THE\nFIRST PLAYER LOSES ONE HUNTER THE\nGAME WILL RETURN TO THE BEGINNING FOR\nTHE SECOND PLAYER TO COMMENCE.\n\n8. IF THE HUNTER IS SUCCESSFUL IN\nKILLING ALL OF THE BABY MOLES AND\nFINALLY THE GRANDFATHER, HE WILL\nRECEIVE 300 POINTS AND A FURTHER\n100 POINTS FOR EACH PEANUT THAT\nREMAINS.\n\n9. THE HUNTER CANNOT GUESS WHERE THE\nMOLES WILL EMERGE AND IF HE STRIKES\nAT, AND MISSES ONE, THE GRANDFATHER\nWILL LAUGH.\n\n10. WHEN ALL OF THE HUNTERS HAVE BEEN\nBITTEN AND THE LAST ONE CARRIED OFF\nTHE GAME IS OVER.\n\n---\n\n**SCORE**\n\n
\n\n
\n
GAME
\n
POINTS
\n
\n\n\n
\n
KILL BABY
\n
30
\n
\n
\n
STRIKE GRANDFATHER
\n
50
\n
\n
\n
KILL GRANDFATHER
\n
300
\n
\n
\n
REMAINING PEANUT
\n
100
\n
\n\n
\nMORE HUNTER 2\n\nIO and OPU boards same as\n\nASTRO FIGHTER - REFER TO\nASTRO FIGHTER TA-7 MANUAL,\n電気図面です。図面の文脈や記号については不明です。\nMOLE HUNTER\n\nHOW TO PLAY\n\n1. On the screen appear 16 baby moles and 16 peanuts. In the lower center lives Grandfather mole. In the top right hand corner, there are 4 mole hunters armed with hammers. (See Dia 1)\n\n2. When you begin to play, one mole hunter will travel automatically to the center at the top of the screen. Upon his arrival, all the moles will disappear underground. The dotted lights showing where the moles are burrowing. (See Dia 2)\n3. Soon, some baby moles will surface and begin to search for peanuts. However, they can only eat the peanuts if they can approach close enough to enter the dotted area around them. The hunter must try to kill the baby moles before all of the peanuts are eaten. (See Dia 3)\n\n4. When the hunter kills a baby mole, they will go to heaven and points are awarded to the hunter. With the loss of each baby, the Grandfather cries. However, if the hunter strikes at and misses a baby, the Grandfather laughs. (See Dia 4)\n\n5. If the Grandfather gets close to a peanut, he is able to eat it very quickly, but at this time, the hunter can strike him. When the hunter strikes the Grandfather, he will be awarded 150 or 300 mystery points, and will drive the Grandfather underground again. (See Dia 5)\n6. However, the grandfather can hurt the hunter and is always waiting for a chance to attack", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " more competitive in this market, and that is a good way to expand their business overseas.\n\n\\textsuperscript{6} CTS GAME STUDIES. Relatório de Investigação Preliminar: O Mercado Brasileiro de Jogos Eletrônicos.\n3. POSSIBILITIES AND EXPECTATIONS\n\nAs we have discussed previously, the Brazilian gaming market is challenging for companies to establish operations, and for consumers who do not want (or cannot) pay high prices for games. But national companies are finding ways to contour difficulties and sustainably grow. If we observe some of the main products/services offered by national game companies we can find four main operations: 1) Mobile gaming; 2) Social media games and advergames; 3) Serious games and games for corporate training; 4) A small but emergent board/card games market. We will discuss each one in detail below:\n\n1) Mobile gaming is a true emergent market for Brazilian developers. As mentioned before, the country has a wide base of mobile devices many of them included in the smartphone category with the feature of app downloading. Casual games deserve a highlight inside this context, and they can be defined, according to Trefay and Kaufmann (2010:1), as games that are quick to play, accessible and with simple mechanics. In this kind of game: the rules and goals must be clear; players need to be able to quickly reach proficiency; casual game play adapts to a player’s life and schedule; game concepts borrow familiar content and themes from life.\n\nLots of small publishers and studios are arising in the Brazilian mobile gaming scenario. Many mobile powerhouses are creating spaces for game developing inside their structures. As an example, we can bring the company named PontoMobi, that created in 2013 one game for a popular TV showman named Danilo Gentili; the game “The World Vs. Danilo Gentili7”. The game reached more than 100,000 download in few weeks and was offered to the users in a freemium model; Freemium (free + premium) is a business model by which a proprietary product or service (typically a digital offering such as software, media, games or web services) is provided free of charge, but money (premium) is charged for advanced features, functionality, or virtual goods (in that case, extra stages for the game).\n\nAnother example is the not-so-small company called Sioux, who has developed some mobile apps in partnership with “Grow”, a Brazilian company of toys and board games. One of their successes is the board game \"Perfil\" (which can be translated as Profile) where the player gets tips on famous people, places, things and years, and have to guess among some alternatives which is the right one – a classic Quiz Game. The mobile version made by Sioux\n\n---\n\n7 The game can be downloaded at https://itunes.apple.com/us/app/omvsdg-td/id473979611?mt=8\nreceived 70,000 downloads in the first month, was among the top five in the AppStore Brazil and became one of the highlights in the Samsung Store.\n\n2) Social media games and advergames are another way that Brazilian game designers found to make their games profit. The contemporary multiplatform environment, with so many connections between different devices, became a privileged ambient for the wide use of digital social networks and other technologies. In this context, all kinds of content can be consumed, shared and modified by the users, who also control their own modes of distribution.\n\nBefore we move on, it is important to explain that, in this context, we define social network sites in the words of Boyd and Ellison (2007), as web-based services that allow individuals to A) construct a public or semi-public profile within a bounded system, B) articulate a list of other users with whom they share a connection, and C) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site.\n\nIt is also equally important to bring a definition of advergaming in this context. As we already discussed (BERIMBAU 2010: 61), there are many strategies in which brands can buy advertising space in the cyberspace of the game, like in-game advertising, dynamic in-game, game skinning, pre-game and post-game, static in-game and so on. More than to define the ever changing meaning of these practices, we need to understand that these communication strategies in videogames do not differ much from newspapers, TV programs, radio etc., in terms of media usage by ad makers. Here, brands too buy a place in a media that can (but not will) offer a content that is pertinent both to the media consumer and to the brand. Here, the relation of the brand with the game content looks more distant than the strategy of the advergame, that are, as defined by IAB, games created specifically for a brand, built from start to finish about a product or service. Here, the brand is not placed like an ad or a sponsor, somewhat dislocated from the experience generated through the game rules and aesthetics. In advergames, the fabric of meanings that constitute a brand are materialized within the dynamic and aesthetic of the game, producing experiences for the player that are uniquely relevant to that brand. Sports games, on the other hand, may seem as an exception, but they are not. It may seem that way because the sponsoring brands in racing cars or the ads on the edges of the soccer fields or tennis courts seem to give the player a better sense of reality,\n\n---\n\n8 This content is available at: [http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html](http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html) (last access: May, 2014)\ntrying to make the environment less fictitious to the player while simulating the experience of the consumption of the sport. In these cases, brands can be noted as “in the game”, and maybe even making it better somehow, but a game where Coke is present is not a game about Coke. The brand is not materializing its own semantic universe through the constituting elements of the game, but they are buying space (in this case, digital space) to be seen and remembered. In this sense, the game Doritos Crash Course looks more like a pertinent advergaming example as the constitutive elements of the game (rules and aesthetics) seek to give experiences to the player that promotes the symbolic consumption of the brand.\n\nDigital environments are great places to simulate this type of advertising. Internet and videogames already have many games like that, and Mobile media (cellphones, iPads, iPhones) are increasingly being used by brands that choose this marketing strategy. Also, the evergrowing social networks like Facebook created a market for companies to develop games to social media and advergames. A company named Hive (www.hive.com.br) is one good example of an enterprise engaged in creating social games and advergames for global brands like Procter & Gamble and some local famous Brazilian brands, like the Skol beer.\n\n3) Serious games and games for corporate training: following the thoughts of Nick Iuppa and Terry Borst (2007), this mode of game may be explained as games with a professional, educational or pedagogical use. Among electronic games, these serious games are the ones that most looks like advergames, in sense of its strategic use: in both, entertainment is the mean why the player is playing, but it is not why the game exists. There is the clear intention to communicate or teach something to the user. There are many companies like Games For Business (http://www.games4b.com.br/) that created many games for corporate training and ecological thinking. Some other are Aennova 360 (http://www.aennova.com/blog), E-Guru (http://www.e-guru.com.br/index.php/home) and OGG Corporate Simulations (http://www.ogg.com.br/index.php)\n\n4) Board/card games market: This is still a fairly small market in Brazil, with some major players selling mostly traditional games. But since 2012 it is taking its first steps to new and creative products. Some of these big players are introducing European titles to the market and a still small company called “Galapagos jogos” is bringing some of the new successes of the United States and Europe board/ card game industry. Although we have not found any research on the subject, we can find some local evidence that this kind of gaming is showing signs of growing interest. Some of these evidences are the growth of local offer of new products, appearance of communities in social networks to arrange gamedays, promote trades and meetings; opening of board/ card games theme pubs etc. This kind of hobby is slowly\ngetting a wider base of fans. Also, many of the companies listed on topic 3 also work with board and card games while using this format for training and education, and we can also see some small independent game designers using crowdfunding to put their ideas in the market.\n\nThus, we could observe movements of industrial development and consumption of games on the national scene, but there is still much in potential. The question that emerges from this situation is: what does it take to make that potential become a fact? As noted in a Brazilian news site named [http://convergecom.com.br/](http://convergecom.com.br/), based on a recent research made by BNDES10 (National Bank for Economic and Social Development), gaming industry in the country needs more business experience. Brazil has lots of talents for programming, 3D design, game writing and sound design, but still has a", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " insight from this project would be a better understanding of how coordination and collaboration in highly competitive gaming worlds can build players’ motivations and confidence to engage in self-improvement and a number of social activities. These findings will lead to future research on designing digital games that better combines competitive and collaborative dynamics for effective social learning.\nHow, if at all, Can Students Benefit from Structured Competitive Play?\n\nJames Kozachuk, B.S.\nUniversity of Central Florida\n\nThere is a strong link between participation in structured after-school activities and increased academic achievement among high school students, while engagement in solo activities such as Television Watching has been found to decrease performance in school (Cooper, Valentine, Nye, & Lindsay, 1999). However, much of this research was conducted on sports teams and other structured groups (e.g. church groups) leaving a critical gap of assessing the impact of team-based competition separate from traditional sports. With video-games as such a mainstream source of entertainment for youth, playing these games at a competitive level with friends has begun to follow a similar trend. Electronic sports, or “esports,” refers to competitive video-game play, often played in organized teams. The aim of this research was to better understand what role, if any, organized competitive video-game play has on school performance and to perform an assessment of their suitability as a beneficial after-school activity. Previously, competitive video games have been criticized for increasing feelings of aggression and decreased academic achievement (Gentile, Lynch, Linder, & Walsh, 2004). While much of this research has been criticized (Ferguson, 2007) and esports are becoming an increasingly popular activity for young adults (Hollist, 2015), a dearth of studies are left in their place indicating assessing this research questions is a critical need in both the game and teamwork fields. The current research sought to assess this critical issue by measuring factors that influence team cohesion and academic performance among high school esports teams who play competitive video-games games in a varsity circuit and how this play impacted individuals’ team cohesion at the time of play and the specific factors that influence academic performance of esports team members. Five-hundred (500) students participating in an online varsity video-game league, upon completion of a 12-week competition, were surveyed about their high school team experiences. A structural equation model was built to determine the factors that influence team cohesion, motivation to play, and academic achievement within the esports players. As hypothesized, the amount of structure of the esports club was a moderate predictor of ($\\beta = .14, p<.05$) academic performance (GPA, Number and percentage of honors classes taken) and the cohesiveness of the team ($\\beta = .16, p<.05$). Additionally, self-reports of team performance were also associated with increased cohesiveness ($\\beta = .32, p<.01$), but not motivation to play or academic performance. Amount of video-game play was associated with decreased academic performance ($\\beta = .15, p<.05$), indicating that it is participation in the esports team not video game play that drives increased cohesion and academic performance. Additionally, we found another indirect effect of team cohesion on academic performance as teams that were more cohesive had members who were more intrinsically motivated to play ($\\beta = .56, p <.001$) which lead to further increased academic achievement ($\\beta = .11, p<.05$). The practical implications of this finding could be generalized to the realm of education. Providing a suitable outlet for students to socialize and interact with a community of peers similar to themselves would allow positive academic and social benefits to students. An example of this would be the inception of an esports team at Robert Morris University in Chicago, Illinois. With university investment, Robert Morris University created a high quality team experience for their students, resulting in large performance benefits: reaching high placements in numerous collegiate varsity tournaments in 2014 and 2015. High school such as Guilford High School in Rockford, Illinois, have also adopted similar programs that have been well received by administration, students, and parents. Industry involvement has begun to grow: a good example of this is acquisition of collegiate community organizer, “Tespa,” by Blizzard Entertainment in 2013. This new partnership brings structured community environments to students. Through our research, we hypothesize this kind of environment is bound to produce similar academic benefits demonstrated by the high school students without our sample. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses. This leaves an opportunity for companies to help further advance the structure of these clubs through other supporting partnerships, such as easing the monetary cost of these high quality experiences through product sponsorships, interactivity with these students, or other quality program-building processes. One might ask why industry has been reluctant to invest in these teams: a misconception about the gaming community may be the answer. There is the common stereotype that avid video game players are seen as addicted which leads to further perpetuating the negative connotation that video game players are “low-class, proto-violent addicted and dangerous kids” (Beavis, 1998). This is due to the idea that game playing is addictive, which thus produces a particular form of gamer (Cover, 2006). This has many implications on industry and development in the gaming world. This also leads to the question of the legitimacy of gamers and their authenticity as members of a broad community. There are opportunities to take this research even further: within the literature there are additional benefits which have not been addressed in the present sample. These potential benefits include an increase in prosocial behavior (Kataoka & Vandell, 2013). Further research is currently being conducted within this domain, and we hope to better understand the importance of these high quality socialization experiences and their benefits to students. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses.\n\nREFERENCES<|endoftext|>The sequence of events in a novel leading to the climax\n\n\"Bakers make a lot of __\" is an example of a pun\n\nPersonification gives __ characteristics to an inanimate object\n\n\"It is raining cats and dogs\" is an example of an __\n\nLogos is the use of __ in an argument\n\nHow a story is narrated is called the __ of view\n\nWords used in everyday language or as a passing fad\n\n\"In Idaho, potatoes grow\" is a __ order sentence\n\n__ is the use of an emotional appeal in an argument\n\nMaking fun of human weakness or flaws is called __ in literature\n\nA comparison using \"like\" or \"as\"\n\nAn object or person that stands for more than just itself\n\nStandard English __ does not identify the writer's class or region\n\nEthos is the use of __ appeal in an argument\n\nIn synesthetic __, one sense represents another; \"it smelled yellow\"\n\nA __ tells a story with human characters and lesson or moral\n\n__ uses bitter or cutting remarks that often understate\n\nThe __ includes the time, place and mood of the story\n\n__ sentences do not express a complete thought until the end\n\nThe __ is the introduction at the beginning of a story\n\nAn inner __ is a way of showing the stream of consciousness\n\nA metaphor where a part represents the whole and vice versa\n\n__ shows that two ideas are equal within a sentence\n\n__ adds in extra words to extend the message that is being given\n\nSmog is a well-known __ of smoke and fog\n\n__ diction uses overly complex language to sound smarter\n\nBuzz, huff, quack, moo, splash, beep, tick-tock\n\n\"It was only a little temblor\" to describe an 8.6 earthquake\n\nEnter unused letters from puzzle, in order:\n\n___ __ __ __ __ __ __ __ __ __\n\n___ __ __ __ __ __ __ __ __ __\n\n___ __ __ __ __ __ __ __ __ __\n\nCopy boxed letters to form your hidden message:\n\n___________________________\n\nSolve Hundreds of Clue Search Puzzles\nCovering All Kinds of Topics for FREE!\nNo Membership or Email Required!\nVisit us at www.ClueSearchPuzzles.com<|endoftext|>WE THANK YOU FOR PURCHASING OUR MOLE HUNTER.\nWE ARE HOPEING THAT YOUR CUSTOMERS WILL ENJOY\nTHIS COLOURFUL HUNTING GAME. WE PRESENT THIS\nMANUAL SO THAT YOU MAY HAVE MAXIMUM LIFE AND\nENJOYMENT FROM YOUR MACHINE.\n\nINTRODUCTION FOR \"MOLE HUNTER\"\n==================================\n\n
\n\n
\n
CONTENTS
\n
Page.
\n
\n\n\n
\n
1. Specifications
\n
1
\n
\n
\n
2. Installation
\n
2
\n
\n
\n
3. How to play
\n
4
\n
\n
\n
4. Maintenance
\n
6
\n
\n
\n
5. Maintenance chart
\n
9
\n
\n\n
\nSPECIFICATIONS\n\nSCREEN\nHUNTERS MOVEMENT LEVER\nHUNTER MAY BE MOVED ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nNUMBER OF PLAYERS SELECTION BUTTONS (Plays available for single or double players)\n\nCOIN SLOT\n\nCOIN RETURN LEVER\n\nCOIN RETURN CUP\n\nMAINTENANCE KEY.\n\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " and high school students, and Dr. Guo Freeman has a robust background in studying social dynamics in multiplayer online games, and is using that knowledge to inform electronic sports research. This discussion panel will consist of ten-minute introductions by each of the panelists regarding their current relevant research and professional backgrounds, and will conclude the remainder with an open discussion panel. This panel hopes to explore questions such as:\n\n• With the large reach of these competitive games for both players and spectators, why are there few psychological studies directly looking into the phenomenon of electronic sports?\n• How can researchers recruit individuals for studies on electronic sports? What are the barriers to this research?\n• In what ways can electronic sports-related research be conducted in the field of human factors psychology?\n• How can research benefit the experience of esports players and spectators?\n• What is the role of the spectator in esports? How can human factors better serve this demographic?\n• What can we learn about other disciplines, such as traditional sports, through electronic sports research?\n• Are the similarities between electronic sports and traditional sports similar enough to warrant future studies?\n\nPANELISTS\n\nHow, if at all, does Playing Video Games Affect Attention and Cognition?\nCyrus K. Foroughi, M.A.\nGeorge Mason University\n\nThe rise in competitive esports and more generally in the amount of time that individuals spend playing video games has led researchers to begin to explore the above question. As human factors practitioners, we should investigate how humans interact with these technologies (i.e., video games), and whether those interactions affect attention and cognition.\n\nPrevious Research (Video Game Play). The seminal work by Green and Bavelier (2003) in Nature showed that individuals who self-report as playing video games have heightened attentional abilities. In studies 1-4, they showed that video game players (VGP) had better performance compared to non-video game players (nVGP) on a battery of tasks including the flanker, enumeration, useful-field-of-view, and attentional-blink tasks. These studies were supported by a 5th training study that showed that nVGP who played action video games had increased visual selective attention compared to controls, supporting a casual mechanism. Since then, many cross-sectional and training studies have supported their work (e.g., Cain, Landau, & Shimamura, 2012; Castel et al., 2004; Green & Bavelier, 2006; Green & Bavelier, 2007). However, many studies have failed to replicate these findings. Specifically, Boot and colleagues (2008) failed to replicate the findings of Green and Bavelier (2003) with a similar training study, and many studies have not replicated the cross-sectional findings (e.g., Irons, Remington, & McLean, 2001; Murphy & Spencer, 2009). Further, Boot, Blakely, & Simons (2011) pointed out methodological flaws in many previous studies and other possible explanations that could explain the previous findings. In sum, there is mixed evidence to support the claim that playing video games enhances attentional abilities.\n\nEsports. Although researcher have begun to explore how playing video games may affect attention and cognition, little research exists that has examined how playing esports affects attention and cognition. Arguably, there are many similarities, but some differences are likely to exist. Most individuals who play/compete in esports likely represent the extreme end of individuals who play video games in terms of the amount of time played and the level of skill in the game. Thus, the obvious question is a classic “chicken or egg” question: how does one become an elite esport player? Taking Ericsson’s (Ericsson, Krampe, & Tesch-Römer, 1993) approach, does it requires countless hours of deliberate practice to become elite? Or do innate abilities such as a predisposition of improved reaction time come into play? Or, and this is the most likely scenario, what combination of both is required?\nAssessing Esports Players. One important consideration is the feasibility of measuring the attentional and cognitive abilities of the elite esports players, in this case, professional video game players. This would provide a ceiling for which other data can be compared across video game domains. It is not easy recruiting professional gamers for research. These players travel often and dedicate large portions of their day to practicing. Contacting them can be difficult and attempting to find a time when they can complete an on-site experiment is nearly impossible. Fortunately, as a former professional gamer, I was able to reach out to a few of my friends, and gain access to some current professional action video game players for experiments. Thus, combining my former experience in gaming with my formal training in experimental research, I have started to bridge a gap in this area of research. Further, being someone that these players can relate with made our interactions very positive. Unsurprisingly, early data from our lab indicates that elite esports players (i.e., professional video game players) have attentional abilities that are “off the charts” with very low reaction times and excellent performance on many attentional tasks (e.g., flanker, SART). However, as this data is not final and as correlational does not mean causation, we caution our findings for the time being.\n\nHow, if at all, does Esports Shape Players’ Online and Offline Social/Interpersonal Relationships?\n\nGuo Freeman, Ph.D.\nUniversity of Cincinnati\n\nIn the field of CSCW (Computer-Supported Cooperative Work) and HCI (Human-Computer Interaction), digital games have been considered an effective way to incorporate “warmth, playfulness, and poeticism” (Strong & Gaver, 1996) as powerful complements to design and develop any collaborative systems (Freeman, Bardzell, & Bardzell, 2016). There is already a large body of CSCW and HCI literature on social dynamics in gameplay (e.g., Brown & Bell, 2004; Ducheneaut, Moore, & Nickell, 2007; Ducheneaut & Moore, 2004; Freeman et al., 2015; McEwan et al., 2012). However, esports, as a new form of social gameplay intertwined with sports, collaboration, competition, cohesion, comradeship, blurred boundaries between online and offline social interactions, as well as game culture itself, has received relatively little research attention. The juxtaposition of the social meanings of competitive sports with the implementation of teamwork and collaboration as a game mechanic raises interesting questions about how studying social dynamics in esports can contribute to better designing games for social support and social learning. There is a growing body of scientific research on esports. For example, using interviews and ethnography, Taylor (2012) thoroughly investigates the connection between esports and sports, the path from amateur gaming to professional gaming, the structure and culture of esports, as well as gender issues in the traditionally male-dominated gaming world. By definition, esports is playing competitive games according to generally accepted rules of leagues and tournaments on the Internet (Weiss, 2008). On the one hand, esports are sophisticated Internet applications. Games such as FIFA video game series, Counterstrike (CS), Dota 2, and League of Legends (LoL) rely on advanced networking technologies to facilitate real-time inter-player interaction and competition. On the other hand, esports are highly complex sociotechnical systems. Players usually form small teams (e.g., “clubs”) to compete with other teams. In order to win in such highly competitive virtual environments, esports players extremely emphasize the sense of community, belongingness, cohesion, and comradeship among them. In contrast to regular multiplayer games in which players are physically distant and rarely meet one another offline, esports involve simultaneous watching gameplay on streaming websites (e.g., Twitch) and meeting others regularly at offline tournaments hosted by providers such as the League of Legends Tournament, the Electronic Sports League (ESL), and the National Gaming League. In all of these ways, esports in fact require and foster high level social skills (e.g., interaction, communication, cooperation, negotiation, and management) rather than undermining such skills. Then, the question becomes: How, if at all, do esports shape players’ social lives and interpersonal relationships, both online and offline? To explore this question, this research brings different perspectives and research methods to this topic. Specifically, this research has two contributions: First, it focuses on esports players’ social experiences and interpersonal relationships. This includes a scientific investigation of collaborative/competitive dynamics within the esports community and sheds light on the explicit and/or implicit impacts of esports on players’ collaborative learning and sociability. Second, by exploring when and how esports players feel enjoyment and emotional satisfaction in the interplay between game-mediated competition and collaboration, it endeavors to design and develop games for online social support. This points to future directions for designing value-sensitive and socially oriented games (Flanagan et al., 2005; Friedman, 1996) in contrast to the stereotype of revenue-oriented digital gaming industry. Both online and offline data will be collected for this research. The first type of data will be esports players’ self-reported data (i.e., posts and threads) of their gameplay and social experiences collected from popular online public forums for esports and public Facebook pages for esports teams. The second type of data source will be interview data. Esports players or people who engage in the esports community will be recruited to participate in semi-structured interviews. An in-depth qualitative analysis will be used to code and interpret the data, in order to explore participants’ unique and subjective personal experiences of esports and the rich sociocultural context surrounding their gameplay activities. At last, players’ in-game behaviors and go to public events/social gatherings/offline tournaments for esports will be observed to investigate their social interactions both online and offline. One", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " and bite him. In order to defend himself, the hunter should attack the Grandfather smartly in the beginning. (See Dia 6)\n\n7. If the Grandfather does bite the hunter, a new hunter will take his place. If the fourth and last hunter is bitten, however, two carriers will rush on screen and carry the wounded hunter off. (See Dia 7)\n\n8. If the hunter is successful in killing all of the baby moles, he can then kill the Grandfather. When the hunter succeeds in striking the Grandfather, he will send the Grandfather slowly to heaven and be awarded 300 points plus a further 100 points for each peanut that remains. (see Dia 8)\n\nThis concludes play and the player will be returned to the start again. However your next play may prove more difficult as the moles movement will be faster.<|endoftext|>ABSTRACT\n\nIn this paper we seek to observe the Brazilian gaming market with special emphasis on its potential and peculiar characteristics. Videogames are leading and intertwining landmarks of contemporary culture and, in Brazil, they develop a special role inside the entertainment industry. The Brazilian gaming scenario has a great number of obstacles and difficulties in production and development and is characterized by its high taxes and the absence of big players in gaming industry producing games locally. This results in expensive games that can be bought mostly by the richer classes, which leads, in turn, to high levels of piracy. Despite these challenges, the Brazilian market promises enormous potential for exploring games in many different areas, mostly through digital informational/educational games. We intend to discuss this scenario observing some data and researches, establishing some directions for broader discussions about this promising and complicated communicational ecosystem.\n\nKeywords: communication; Brazil; consumption; games; videogames; media;\n1. A WORD ABOUT BRAZIL\n\nAs an emergent country, Brazil is a land of contrasts. The country is the fifth largest in the world, it has the sixth largest population and it ranks seventh in terms of Internet usage. Brazilians are heavy Internet users, spending the largest average number of hours online\\(^1\\), mainly in social network websites like Facebook, Instagram and Twitter.\n\nIt may sound curious, but it is a fact: the number of mobile phones in Brazil nowadays is larger than the size of its population. In the beginning of 2014, more than 270 million phone lines were in activity in the country and more than 30 million of smartphones are expected to be working\\(^2\\). This is an important point to highlight because in the last five years mobile Internet access has become the dominant in Brazil. A recent study from Nielsen has found that Brazilian mobile users mainly download games, social network and video applications\\(^3\\).\n\nAcknowledging the prominence of digital culture in today's mediapolis (SILVERSTONE 2007), the large amount of videogames and digital platforms can be considered a privileged space for communication and marketing researchers of all kinds.\n\nThis kind of information helps us understand some features of the potential for a gaming market. Although we have no extensive research about the subject, there are some research efforts to better understand the Brazilian gaming market. One research presented in an important Brazilian videogame fair named \"GameWorld\" revealed that 60 million people have at least one videogame console at home. It is almost 33% of Brazil's population. The research revealed another curious fact: 48% of the players buy illegal games and only 17% of the sales occur at game shops\\(^4\\).\n\nWith this brief overview of the Brazilian gaming ecosystem, we will show deeper impressions, numbers and perceptions that we hope to help us broaden the discussion of this subject.\n\n---\n\n\\(^1\\) 23 hours a week, according to the latest available figures.\n\n\\(^2\\) Source: [http://teleco.com.br/](http://teleco.com.br/) (last access: May, 2014)\n\n\n\\(^4\\) Source: [http://jogos.uol.com.br/ultimas-noticias/2012/03/31/segundo-ibope-mais-de-60-milhoes-de-brasileiros-possuem-videogame-em-casa.htm](http://jogos.uol.com.br/ultimas-noticias/2012/03/31/segundo-ibope-mais-de-60-milhoes-de-brasileiros-possuem-videogame-em-casa.htm) (last access: May, 2014)\n2. BRAZILIAN GAMING MARKET: FROM ORIGINS UNTIL TODAY\n\nVideogames are a reality in Brazil since the late 1970s. At that time we had very few Brazilian programmers making games, but we had a lot of small industries copying games, but they could be regarded as \"legally pirated\" games. This began with a government practice in 1977 - and became an actual law in 1984, with the Federal Law 7.232/84 according to Chiado (2011:13) - in which government prohibits all computer hardware and software importation, as well as the establishment of foreign computer companies in the country – and that included videogames as well. With time, this law eventually opened a gap in the legal system which allowed domestic companies to copy the original hardware and software “adjusting” them to the Brazilian market, which basically consists in keeping the software intact and changing their titles, and making some minor changes in hardware (mostly aesthetic, but sometimes they were simpler versions of their original North American counterparts), and then releasing them without paying anything in royalties or copyright. This allowed many games to be released in the Brazilian market.\n\nThis situation may look a lot like the recent strategies of many Chinese industries, but with one major difference: the price of videogames for consumers in Brazil were very high - something between US$600.00 and US$1,000.00 for one videogame console. At that time, videogames were a product for the Brazilian richest – just a few could pay this much for electronic entertainment. This “legal piracy” kept going for some time, and only in 1983 Brazilian people saw the first official videogame in the country: The Atari 2600, known locally only as “Atari” and distributed by a Brazilian company called Polyvox, officially representing the American company in country.\n\nIn the late 1980s and 1990s this “legal piracy” was slowly losing its power and, at the same time, other brands officially arrived in Brazil: Nintendo and Sega first, and XBOX (Microsoft) and Sony later. However, games prices were kept very expensive - both consoles and software. Even when we observe the PC’s market, hardware and software appear as expensive goods. In the 2000s, PC games cost about US$ 70.00, and videogames about US$110.00. If we consider that the Brazilian family income per person of the 20% richest is, today, approximately US$ 1200.00, it is possible to realize that games have always been an entertainment for few people.\n\n5 Source:\n (last access: May, 2014)\nDespite being a very expensive product, a common practice in Brazil is the special financing offer of dividing the payment of the product among months, adding interest. It may be too difficult for an average Brazilian to pay US$1,000.00 for an XBOX ONE, but when one divides its payment equally into twelve months with one’s credit card, it gets a lot easier. This financial practice helped games became more and more a common practice among Brazilians, especially children and teenagers, which received these so desired expensive machines of entertainment mostly on commemorative days such as birthdays or Christmas gifts from their parents.\n\nBut what helped gaming culture spread through Brazilian media repertoire was piracy. Many people, until today, buy pirated goods or download it from the Internet. A researcher from MIT GAMBIT GameLab\\textsuperscript{6} made it clear:\n\n\"Piracy begins when the system reaches an extreme point where it is more convenient and cheaper (than the correct, legal system). If ‘games’ are sold at a fair price and if they are accessible; if the distribution model is efficient and cheap and well done, no one will have a reason to go Pirate. Give people fair prices for products and make them more accessible – that is one way to combat piracy. If it’s accessible and the price is not abusive... What matters is convenience, and it has to surpass piracy. Then, it is not a problem anymore”.\n\nIn Brazil, piracy is quite high, but this looks like a consequence of the characteristics of the domestic market, which suffers mainly from high taxes, concentration of wealth, and lack of infrastructure. Certainly, that is something to be understood and dealt with, if any gaming company thinks of beginning operations locally.\n\nMore recently the gaming culture has emerged in other social classes. That happens due to the high market penetration of smartphones in the middle class (as we saw in the previous topic). Because of that, mobile gaming is increasingly becoming more present among the entertainment habits of Brazilian people. The mobile gaming market is a kind of “escape route” for game developers in Brazil, which have the possibility to create games and – effectively – make them available for download to the entire world. That is why many national companies are making games for tablets and smartphones, knowing that they can be", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " lack of professionals to consistently and sustainably develop the field. Still, it’s a seemingly ordinary idea in the national industry that most of the newly graduated game designers dream of making their own God of War game, or work in the next Call of Duty project – and that is something that he will not find here. As we have seen the local industry demands for people who THINK games, they are quick in solving production issues with simple and straightforward ideas and know how to use them as a means of communication, if necessary. It may not be a job that will offer all the glamour of having your name in the credits of a super-production, but by no means is it less challenging, demanding and interesting.\n\nThese main operation types of Brazilian companies and freelancers should be understood as illustrations of the national producer/consumer scenery. In no way we seek to include all the strategies of Brazilian gaming companies or exhaust the possibilities of activities on national or international gaming markets. We wish here to point to some characteristics of the national scene looking to shed light on the common sense that the \"game industry\" refers only to videogame consoles or mainstream PC games. This perception is something that specialized media seems to emphasize, because that seems to be the preference of games heavy users - although, as seen through research, the casual gamer plays more games and for longer than the hardcore gamer, as Juul (2010) says. For local producers, perhaps Steam, Apple Store, Google Play and gaming portals are more suitable as distribution channels, while research and development focused on training/education games seem to be a more fertile market.\n\n---\n\n10 Source: http://goo.gl/00Wi1X (last access: May, 2014)\n4. IN SHORT\n\nBy discussing this overview about the Brazilian gaming market, we hope to demonstrate the different strategies that some companies utilize to explore the market and excel in this contemporary digital ecosystem.\n\nThe delicate relationship between consumers and brands/companies in a digital environment requires special care on both sides. Marketing and technology are no longer separate worlds and we can see it clearly in the videogames universe.\n\nWe welcome the opportunity to present this relevant discussion as a means of contributing to the ongoing efforts in exploring the Brazilian gaming market in contemporary media and consumption culture. We hope this brief paper inspires other researches and new ways to find answers in this prosperous and complicated entertainment market.\nREFERENCES\n\n\nTREFAY, Gregory; KAUFMANN, Morgan. *Casual Game Design*. Burlington: Morgan Kaufmann, 2010<|endoftext|>WE THANK YOU FOR PURCHASING OUR MOLE HUNTER.\nWE ARE HOPEING THAT YOUR CUSTOMERS WILL ENJOY\nTHIS COLOURFUL HUNTING GAME. WE PRESENT THIS\nMANUAL SO THAT YOU MAY HAVE MAXIMUM LIFE AND\nENJOYMENT FROM YOUR MACHINE.\n\nINTRODUCTION FOR \"MOLE HUNTER\"\n==================================\n\n
\n\n
\n
CONTENTS
\n
Page.
\n
\n\n\n
\n
1. Specifications
\n
1
\n
\n
\n
2. Installation
\n
2
\n
\n
\n
3. How to play
\n
4
\n
\n
\n
4. Maintenance
\n
6
\n
\n
\n
5. Maintenance chart
\n
9
\n
\n\n
\nSPECIFICATIONS\n\nSCREEN\nHUNTERS MOVEMENT LEVER\nHUNTER MAY BE MOVED ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nNUMBER OF PLAYERS SELECTION BUTTONS (Plays available for single or double players)\n\nCOIN SLOT\n\nCOIN RETURN LEVER\n\nCOIN RETURN CUP\n\nMAINTENANCE KEY.\n\nFLOURESCENT LAMP\nNAME PLATE\nSPEAKER\nSTRIKE BUTTON\nPOWER SUPPLY SWITCH\n\n#DEMGNETIZING SWITCH\nSERVICE SOCKET\nCASH BOX\n\nCOIN BOX KEY\n\n#DEMGNETIZING SWITCH (Used only when correcting irregular colour when power switch is turned on.)\n\nSPECIFICATION\n\n
\n\n
\n
POWER SUPPLY
\n
AC100V - 240V (to be adjusted)
\n
\n\n\n
\n
POWER CONSUMPTION
\n
120W (AC100V)
\n
\n
\n
GAME COST
\n
ADJUSTABLE (REF. PAGE 3)
\n
\n
\n
DIMENSIONS
\n
W x D x H = 610 x 890 x 1700
\n
\n
\n
CASH BOX CAPACITY
\n
(2,200 coins of Yen ¥100.-)
\n
\n
\n
CRT
\n
20" Colour (monochro)
\n
\n\n
\n\nThese specifications may be changed without notice.\nAs the CRT used is the same as that in home TVs care must be taken to avoid damage during transportation and installation.\n\nAs this set is for indoor use do not install outdoors.\n\nAvoid places under direct sunlight and also avoid humid or dusty places.\n\nInstall on a solid level floor.\n\nLeave a suitable space around the machine to avoid obstruction during play and maintenance.\nBEFORE PLUGGING IN THE POWER CORD\n\nUSE THE DIP SWITCH TO SET YOUR MACHINE. IT IS LOCATED IN THE LOWER RIGHT AND ACCESSIBLE BY PULLING OUT PCB 1 AS SHOWN IN THE DIAGRAM.\n\nEXAMPLE SET AT TIME OF SHIPMENT\n\nSELECT YOUR COINAGE\nSELECT REPLAY POINTS\nREFER TO THE CHART FOR OTHER SETTINGS\n\nPLUG IN THE POWER CORD (ARRANGE THE CORD SO THAT IT IS OUT OF THE CUSTOMERS WAY). TURN THE POWER SWITCH ON.\n\nWHEN THE COLOUR IS IRREGULAR, PUSH THE DE MAGNETIZING SWITCH FOR 2 OR 3 SECONDS (SEE PAGES 1 & 9)\n\n
\n\n
\n
NO.
\n
SET
\n
FUNCTIONS
\n
\n\n\n
\n
1
\n
\n
FOR ADJUSTMENT
\n
\n
\n
2
\n
ON
\n
ON
\n
\n
\n
3
\n
ON
\n
OFF
\n
\n
\n
\n
1500
\n
3000
\n
\n
\n
4
\n
ON
\n
ON
\n
\n
\n
5
\n
ON
\n
OFF
\n
\n
\n
\n
3
\n
4
\n
\n\n
\n\nBONUS POINTS\n\nNUMBER OF HUNTERS\n\nGAME CHARGE\n\n
\n\n
\n
NO.
\n
SET
\n
FUNCTIONS
\n
\n
\n\n\n
\n
6
\n
ON
\n
ON
\n
OFF
\n
\n
\n
7
\n
ON
\n
OFF
\n
ON
\n
\n
\n
\n
1 coin
\n
1 coin
\n
2 coins
\n
\n
\n
8
\n
ON
\n
PREVENT
\n
\n
\n
\n
\n
OFF
\n
TURNING
\n
\n
\n
\n
\n
\n
GAME SCREEN
\n
\n
\n\n
\n\n
| | | |
\n
\n\n
\n
\n
\n
\n
\n\n
\nHOW TO PLAY\n\n1. INSERT COIN\n\n2. PUSH BUTTON ↓ FOR ONE PLAYER OR BUTTON ↓↓ FOR TWO PLAYERS AS DESIRED TO START.\n\n3. ONE MOLE HUNTER WILL TRAVEL AUTOMATICALLY TO THE TOP CENTER OF THE SCREEN AND UPON HIS ARRIVAL THE MOLES WILL BURROW UNDERGROUND. THE GAME STARTS.\n\n4. USE THE CONTROL LEVER TO MOVE THE HUNTER ACROSS, ALONG OR DIAGONALLY OVER THE SCREEN.\n\nWHEN THE MOLES EMERGE TO EAT, STRIKE THEM.\n\nTHE HIGHEST SCORE ACHIEVED WHILE THE MACHINE IS ON WILL BE REGISTERED.\n\nPARTNERS ↓↓ SCORE\n\nSINGLE PLAYERS ↓ SCORE\n\nPEANUT\n\nDOTTED LIGHTS SHOWING WHERE THE MOLES ARE BURROWING\n\nAFTER STRIKING A MOLE IT WILL RISE TO HEAVEN, LIKE THIS.\n\nGRAND FATHER MOLE. HE IS ALWAYS WAITING FOR A CHANCE TO BITE THE HUNTER SO THE HUNTER SHOULD APPROACH HIM FROM BEHIND\n\nNUMBER OF HUNTERS PER PLAY\n\nHALF EATEN PEANUT\n\nMOLE EATING A PEANUT\n\nBABY MOLE EMERGING\n5. IF THE HUNTER STRIKES THE\nGRANDFATHER, HE WILL RECEIVE\n50 POINTS BUT HE CANNOT KILL\nTHE GRANDFATHER", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": " includes a scientific investigation of collaborative/competitive dynamics within the esports community and sheds light on the explicit and/or implicit impacts of esports on players’ collaborative learning and sociability. Second, by exploring when and how esports players feel enjoyment and emotional satisfaction in the interplay between game-mediated competition and collaboration, it endeavors to design and develop games for online social support. This points to future directions for designing value-sensitive and socially oriented games (Flanagan et al., 2005; Friedman, 1996) in contrast to the stereotype of revenue-oriented digital gaming industry. Both online and offline data will be collected for this research. The first type of data will be esports players’ self-reported data (i.e., posts and threads) of their gameplay and social experiences collected from popular online public forums for esports and public Facebook pages for esports teams. The second type of data source will be interview data. Esports players or people who engage in the esports community will be recruited to participate in semi-structured interviews. An in-depth qualitative analysis will be used to code and interpret the data, in order to explore participants’ unique and subjective personal experiences of esports and the rich sociocultural context surrounding their gameplay activities. At last, players’ in-game behaviors and go to public events/social gatherings/offline tournaments for esports will be observed to investigate their social interactions both online and offline. One insight from this project would be a better understanding of how coordination and collaboration in highly competitive gaming worlds can build players’ motivations and confidence to engage in self-improvement and a number of social activities. These findings will lead to future research on designing digital games that better combines competitive and collaborative dynamics for effective social learning.\nHow, if at all, Can Students Benefit from Structured Competitive Play?\n\nJames Kozachuk, B.S.\nUniversity of Central Florida\n\nThere is a strong link between participation in structured after-school activities and increased academic achievement among high school students, while engagement in solo activities such as Television Watching has been found to decrease performance in school (Cooper, Valentine, Nye, & Lindsay, 1999). However, much of this research was conducted on sports teams and other structured groups (e.g. church groups) leaving a critical gap of assessing the impact of team-based competition separate from traditional sports. With video-games as such a mainstream source of entertainment for youth, playing these games at a competitive level with friends has begun to follow a similar trend. Electronic sports, or “esports,” refers to competitive video-game play, often played in organized teams. The aim of this research was to better understand what role, if any, organized competitive video-game play has on school performance and to perform an assessment of their suitability as a beneficial after-school activity. Previously, competitive video games have been criticized for increasing feelings of aggression and decreased academic achievement (Gentile, Lynch, Linder, & Walsh, 2004). While much of this research has been criticized (Ferguson, 2007) and esports are becoming an increasingly popular activity for young adults (Hollist, 2015), a dearth of studies are left in their place indicating assessing this research questions is a critical need in both the game and teamwork fields. The current research sought to assess this critical issue by measuring factors that influence team cohesion and academic performance among high school esports teams who play competitive video-games games in a varsity circuit and how this play impacted individuals’ team cohesion at the time of play and the specific factors that influence academic performance of esports team members. Five-hundred (500) students participating in an online varsity video-game league, upon completion of a 12-week competition, were surveyed about their high school team experiences. A structural equation model was built to determine the factors that influence team cohesion, motivation to play, and academic achievement within the esports players. As hypothesized, the amount of structure of the esports club was a moderate predictor of ($\\beta = .14, p<.05$) academic performance (GPA, Number and percentage of honors classes taken) and the cohesiveness of the team ($\\beta = .16, p<.05$). Additionally, self-reports of team performance were also associated with increased cohesiveness ($\\beta = .32, p<.01$), but not motivation to play or academic performance. Amount of video-game play was associated with decreased academic performance ($\\beta = .15, p<.05$), indicating that it is participation in the esports team not video game play that drives increased cohesion and academic performance. Additionally, we found another indirect effect of team cohesion on academic performance as teams that were more cohesive had members who were more intrinsically motivated to play ($\\beta = .56, p <.001$) which lead to further increased academic achievement ($\\beta = .11, p<.05$). The practical implications of this finding could be generalized to the realm of education. Providing a suitable outlet for students to socialize and interact with a community of peers similar to themselves would allow positive academic and social benefits to students. An example of this would be the inception of an esports team at Robert Morris University in Chicago, Illinois. With university investment, Robert Morris University created a high quality team experience for their students, resulting in large performance benefits: reaching high placements in numerous collegiate varsity tournaments in 2014 and 2015. High school such as Guilford High School in Rockford, Illinois, have also adopted similar programs that have been well received by administration, students, and parents. Industry involvement has begun to grow: a good example of this is acquisition of collegiate community organizer, “Tespa,” by Blizzard Entertainment in 2013. This new partnership brings structured community environments to students. Through our research, we hypothesize this kind of environment is bound to produce similar academic benefits demonstrated by the high school students without our sample. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses. This leaves an opportunity for companies to help further advance the structure of these clubs through other supporting partnerships, such as easing the monetary cost of these high quality experiences through product sponsorships, interactivity with these students, or other quality program-building processes. One might ask why industry has been reluctant to invest in these teams: a misconception about the gaming community may be the answer. There is the common stereotype that avid video game players are seen as addicted which leads to further perpetuating the negative connotation that video game players are “low-class, proto-violent addicted and dangerous kids” (Beavis, 1998). This is due to the idea that game playing is addictive, which thus produces a particular form of gamer (Cover, 2006). This has many implications on industry and development in the gaming world. This also leads to the question of the legitimacy of gamers and their authenticity as members of a broad community. There are opportunities to take this research even further: within the literature there are additional benefits which have not been addressed in the present sample. These potential benefits include an increase in prosocial behavior (Kataoka & Vandell, 2013). Further research is currently being conducted within this domain, and we hope to better understand the importance of these high quality socialization experiences and their benefits to students. Through dissemination of this research to teachers, educators, and school-board members we have better informed potential relevant stakeholders to this positive academic experience, who in turn have begun to take action to help reduce the archaic resistance to allowing these clubs on their campuses.\n\nREFERENCES<|endoftext|>Squirt Bottle Game\n\nSupplies:\nSpray bottle set at the tight setting\nLight weight balls\nBroom/mop handles or other side rails\nFlat table\nTowel for drying between turns\nDirections:\nArrange the broom handles, or other type of rails, along the long sides of the table. You can place a container at the receiving end to catch the balls. A water proof table cloth at this end is also a good idea to keep the area dry.\nHave the child sit or stand at one end of the table with a ball in front of her/him. Give them the spray bottle and have them squirt the ball all the way down until it drops off the other end of the table. The child may need to use both hands and, if the child is very young or very weak, they may need hand-over-hand assistance.<|endoftext|>Exploring electronic sports: An interdisciplinary approach\n\nJames Kozachuk, B.S., University of Central Florida, Orlando, FL\nCyrus K. Foroughi, M.A., George Mason University, Fairfax, VA\nGuo Freeman, Ph.D., University of Cincinnati, Cincinnati, OH\n\nINTRODUCTION\n\nElectronic Sports, or “esports,” refers to high-level play and spectating of digital video-games (Hamilton, 2012), and typically involves a team of players. These players perform at the peak level of performance in these games—making reflexive and precise hand-movements, taking in and responding to large amounts of information, and work effectively with their team. The large similarities that this form of competition has with traditional sport has lead the U.S. government to begin assigning P-1A athletic visas to competitors. This field has grown drastically over the last decade—more competitions and players are participating and events attract millions of worldwide online spectators. In this panel we will discuss current research involving these players in the fields of human-computer interaction, team dynamics, cognition, information processing, as well as the potential applications in other subfields. The panelists have both direct research and professional experience with electronic sports: Cyrus Foroughi will provide insight as a former professional-gamer, James Kozachuk has run multiple nationwide tournaments for college", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-games", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-games/part-00-00000.npy", "text": "Exploring electronic sports: An interdisciplinary approach\n\nJames Kozachuk, B.S., University of Central Florida, Orlando, FL\nCyrus K. Foroughi, M.A., George Mason University, Fairfax, VA\nGuo Freeman, Ph.D., University of Cincinnati, Cincinnati, OH\n\nINTRODUCTION\n\nElectronic Sports, or “esports,” refers to high-level play and spectating of digital video-games (Hamilton, 2012), and typically involves a team of players. These players perform at the peak level of performance in these games—making reflexive and precise hand-movements, taking in and responding to large amounts of information, and work effectively with their team. The large similarities that this form of competition has with traditional sport has lead the U.S. government to begin assigning P-1A athletic visas to competitors. This field has grown drastically over the last decade—more competitions and players are participating and events attract millions of worldwide online spectators. In this panel we will discuss current research involving these players in the fields of human-computer interaction, team dynamics, cognition, information processing, as well as the potential applications in other subfields. The panelists have both direct research and professional experience with electronic sports: Cyrus Foroughi will provide insight as a former professional-gamer, James Kozachuk has run multiple nationwide tournaments for college and high school students, and Dr. Guo Freeman has a robust background in studying social dynamics in multiplayer online games, and is using that knowledge to inform electronic sports research. This discussion panel will consist of ten-minute introductions by each of the panelists regarding their current relevant research and professional backgrounds, and will conclude the remainder with an open discussion panel. This panel hopes to explore questions such as:\n\n• With the large reach of these competitive games for both players and spectators, why are there few psychological studies directly looking into the phenomenon of electronic sports?\n• How can researchers recruit individuals for studies on electronic sports? What are the barriers to this research?\n• In what ways can electronic sports-related research be conducted in the field of human factors psychology?\n• How can research benefit the experience of esports players and spectators?\n• What is the role of the spectator in esports? How can human factors better serve this demographic?\n• What can we learn about other disciplines, such as traditional sports, through electronic sports research?\n• Are the similarities between electronic sports and traditional sports similar enough to warrant future studies?\n\nPANELISTS\n\nHow, if at all, does Playing Video Games Affect Attention and Cognition?\nCyrus K. Foroughi, M.A.\nGeorge Mason University\n\nThe rise in competitive esports and more generally in the amount of time that individuals spend playing video games has led researchers to begin to explore the above question. As human factors practitioners, we should investigate how humans interact with these technologies (i.e., video games), and whether those interactions affect attention and cognition.\n\nPrevious Research (Video Game Play). The seminal work by Green and Bavelier (2003) in Nature showed that individuals who self-report as playing video games have heightened attentional abilities. In studies 1-4, they showed that video game players (VGP) had better performance compared to non-video game players (nVGP) on a battery of tasks including the flanker, enumeration, useful-field-of-view, and attentional-blink tasks. These studies were supported by a 5th training study that showed that nVGP who played action video games had increased visual selective attention compared to controls, supporting a casual mechanism. Since then, many cross-sectional and training studies have supported their work (e.g., Cain, Landau, & Shimamura, 2012; Castel et al., 2004; Green & Bavelier, 2006; Green & Bavelier, 2007). However, many studies have failed to replicate these findings. Specifically, Boot and colleagues (2008) failed to replicate the findings of Green and Bavelier (2003) with a similar training study, and many studies have not replicated the cross-sectional findings (e.g., Irons, Remington, & McLean, 2001; Murphy & Spencer, 2009). Further, Boot, Blakely, & Simons (2011) pointed out methodological flaws in many previous studies and other possible explanations that could explain the previous findings. In sum, there is mixed evidence to support the claim that playing video games enhances attentional abilities.\n\nEsports. Although researcher have begun to explore how playing video games may affect attention and cognition, little research exists that has examined how playing esports affects attention and cognition. Arguably, there are many similarities, but some differences are likely to exist. Most individuals who play/compete in esports likely represent the extreme end of individuals who play video games in terms of the amount of time played and the level of skill in the game. Thus, the obvious question is a classic “chicken or egg” question: how does one become an elite esport player? Taking Ericsson’s (Ericsson, Krampe, & Tesch-Römer, 1993) approach, does it requires countless hours of deliberate practice to become elite? Or do innate abilities such as a predisposition of improved reaction time come into play? Or, and this is the most likely scenario, what combination of both is required?\nAssessing Esports Players. One important consideration is the feasibility of measuring the attentional and cognitive abilities of the elite esports players, in this case, professional video game players. This would provide a ceiling for which other data can be compared across video game domains. It is not easy recruiting professional gamers for research. These players travel often and dedicate large portions of their day to practicing. Contacting them can be difficult and attempting to find a time when they can complete an on-site experiment is nearly impossible. Fortunately, as a former professional gamer, I was able to reach out to a few of my friends, and gain access to some current professional action video game players for experiments. Thus, combining my former experience in gaming with my formal training in experimental research, I have started to bridge a gap in this area of research. Further, being someone that these players can relate with made our interactions very positive. Unsurprisingly, early data from our lab indicates that elite esports players (i.e., professional video game players) have attentional abilities that are “off the charts” with very low reaction times and excellent performance on many attentional tasks (e.g., flanker, SART). However, as this data is not final and as correlational does not mean causation, we caution our findings for the time being.\n\nHow, if at all, does Esports Shape Players’ Online and Offline Social/Interpersonal Relationships?\n\nGuo Freeman, Ph.D.\nUniversity of Cincinnati\n\nIn the field of CSCW (Computer-Supported Cooperative Work) and HCI (Human-Computer Interaction), digital games have been considered an effective way to incorporate “warmth, playfulness, and poeticism” (Strong & Gaver, 1996) as powerful complements to design and develop any collaborative systems (Freeman, Bardzell, & Bardzell, 2016). There is already a large body of CSCW and HCI literature on social dynamics in gameplay (e.g., Brown & Bell, 2004; Ducheneaut, Moore, & Nickell, 2007; Ducheneaut & Moore, 2004; Freeman et al., 2015; McEwan et al., 2012). However, esports, as a new form of social gameplay intertwined with sports, collaboration, competition, cohesion, comradeship, blurred boundaries between online and offline social interactions, as well as game culture itself, has received relatively little research attention. The juxtaposition of the social meanings of competitive sports with the implementation of teamwork and collaboration as a game mechanic raises interesting questions about how studying social dynamics in esports can contribute to better designing games for social support and social learning. There is a growing body of scientific research on esports. For example, using interviews and ethnography, Taylor (2012) thoroughly investigates the connection between esports and sports, the path from amateur gaming to professional gaming, the structure and culture of esports, as well as gender issues in the traditionally male-dominated gaming world. By definition, esports is playing competitive games according to generally accepted rules of leagues and tournaments on the Internet (Weiss, 2008). On the one hand, esports are sophisticated Internet applications. Games such as FIFA video game series, Counterstrike (CS), Dota 2, and League of Legends (LoL) rely on advanced networking technologies to facilitate real-time inter-player interaction and competition. On the other hand, esports are highly complex sociotechnical systems. Players usually form small teams (e.g., “clubs”) to compete with other teams. In order to win in such highly competitive virtual environments, esports players extremely emphasize the sense of community, belongingness, cohesion, and comradeship among them. In contrast to regular multiplayer games in which players are physically distant and rarely meet one another offline, esports involve simultaneous watching gameplay on streaming websites (e.g., Twitch) and meeting others regularly at offline tournaments hosted by providers such as the League of Legends Tournament, the Electronic Sports League (ESL), and the National Gaming League. In all of these ways, esports in fact require and foster high level social skills (e.g., interaction, communication, cooperation, negotiation, and management) rather than undermining such skills. Then, the question becomes: How, if at all, do esports shape players’ social lives and interpersonal relationships, both online and offline? To explore this question, this research brings different perspectives and research methods to this topic. Specifically, this research has two contributions: First, it focuses on esports players’ social experiences and interpersonal relationships. This", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": "90 (as defined by the original treatment plan) with increasing VS accumulation leading to a sub-optimal coverage of the PTV_Eval. For 30 cc MLB catheter, V100 decreased by 1.4% and V90 decreased by 0.9% for every 1 cc of VS. For 45cc MLB catheter, V100 decreased by 1.3% and V90 decreased by 1.15% for every 1.0 cc accumulation of VS.\n\nConclusions: Balloon catheter-tissue adherence ensures daily dose delivery to the planned PTV_Eval. Accumulation of seroma, hematoma or air between HDR fractions can significantly impact PTV_Eval dosimetry. Vacuum-port aspiration prior to delivery of each fraction, if available, should be considered to minimize the risk of geographic under dosing.\n\nJ Contemp Brachyther 2012; 4, 2: 101-105\nDOI: 10.5114/jcb.2012.29366\n\nKey words: seroma, dosimetry, breast brachytherapy, contura catheter.\nMaterial and methods\n\nThis is a dosimetric re-planning study using two volumes (30 cc and 45 cc) in a Contura® MLB catheter model. The Contura® balloon catheter was used for this study, because it is the only FDA-approved balloon brachytherapy device currently on the market that contains a vacuum port specifically designed to aspirate seroma, hematoma and/or air collection. Proof of principle of aspiration of the accumulated seroma via the vacuum port is shown in Fig. 1.\n\nTwo customized optimal treatment plans (for balloon volumes of 30 and 45 cc) were first generated using a single patient scan. Uniform balloon expansion of 1 mm increments around the balloon surface was then performed to simulate a theoretical and symmetrical “virtual seroma” (VS) accumulation up to 9 mm (Fig. 2). The volume (in cc) of this expansion was calculated by the Eclipse Brachyvision™ (Varian Inc., Palo Alto, CA) software to estimate each VS. With the use of the multiple (up to 5) channels of the Contura® catheter, the plans were generated prescribing 3.4 Gy per fraction to a “PTV_Eval” (a 10 mm PTV with appropriate modifications for skin and chest wall per RTOG 0413 guidelines).\n\nNew individualized plans were then generated for each 1 mm increment, representing additional accumulating VS, resulting in 10 plans for each balloon volume. Each potential plan scenario and dose-volume histograms were individually generated to compare changes in dosimetric coverage of the initially defined PTV_Eval. PTV_Eval dosimetry was then analyzed independently for each plan to assess the effect of the VS on the percent volume of PTV_Eval covered by the 100% isodose line (IDL) (V100) and the percent volume of PTV_Eval covered by the 90% IDL (V90).\n\nResults\n\nA total of twenty individual and customized 3-dimensional brachytherapy plans were generated for this comparative dosimetric study (ten each for 30 cc and 45 cc balloon volumes), representing VS volumes of 6-60 cc. For each simulated plan, the accumulation of VS volume resulted in increased distance separating peri-cavity breast tissue target from the balloon surface. This separation produced a commensurate decrease in the V100 and the V90 of the PTV_Eval (as defined by the original treatment plan) with increasing VS accumulation. Table 1 shows the effect of increasing seroma accumulation on the plans generated for 30 cc and 45 cc balloon, respectively. Each increasing uniform expansion of the balloon catheter to simulate VS resulted in a symmetrical volumetric target separation. This translated into a corresponding decrease in V100 and V90. Tabular data is represented as a scatter plot for 30 cc and 45 cc balloon catheters in Figs. 3, 4 and 5, 6, respectively. The best-fit-line model for 30 cc balloon showed that V100 coverage of the PTV_EVAL decreased by 1.4% for every 1 cc accumulation of VS (Range = 7-10% for every 5-7 cc). A similar pattern was noted for the scatter plot analysis for 45 cc catheter, where V100 was shown to decrease by 1.3% for every 1 cc accumulation of VS (Range = 6-9% for every 5-7 cc). For V90, scatter plot analyses revealed a decreased coverage of 0.9% for every 1 cc of VS for 30 cc balloon plans and 1.15% for 45 cc balloon plans.\nTable 1. Twenty plans based on 30 and 45 cc balloon catheters\n\n
\n\n
\n
Plan #
\n
Increase in balloon to breast tissue distance (mm)
\n
30 cc balloon catheter plans
\n
45 cc balloon catheter plans
\n
\n\n\n
\n
\n
Seroma volume (cc)
\n
Vol of PTV_Eval covered by 100% IDL (cc)
\n
% of initial PTV_Eval covered by 90% IDL (V90)
\n
\n
\n
1
\n
0
\n
65.6
\n
100
\n
\n
\n
2
\n
1
\n
6
\n
59.6
\n
\n
\n
3
\n
2
\n
10.3
\n
55.3
\n
\n
\n
4
\n
3
\n
15.7
\n
49.9
\n
\n
\n
5
\n
4
\n
21.8
\n
43.8
\n
\n
\n
6
\n
5
\n
28.2
\n
37.4
\n
\n
\n
7
\n
6
\n
34.9
\n
30.7
\n
\n
\n
8
\n
7
\n
41.8
\n
23.8
\n
\n
\n
9
\n
8
\n
49.3
\n
16.3
\n
\n
\n
10
\n
9
\n
59.2
\n
9.9
\n
\n\n
\n\nNote: The table includes the effect of accumulating seroma causing an increase in balloon to breast tissue distance. This in turn affects the volume and percentage of the initial PTV_Eval covered by 100% (V100) and 90% (V90) IDL, leading to sub-optimal plans. IDL – isodose line.\n\nFig. 3. Scatter plot and best fit line of V100 for repeat plans with increasing seroma volumes for 30 cc balloon catheter\n\nFig. 4. Scatter plot and best fit line of V90 for repeat plans with increasing seroma volumes for 30 cc balloon catheter\n\nFig. 5. Scatter plot and best fit line of V100 for repeat plans with increasing seroma volumes for 45 cc balloon catheter\n\nFig. 6. Scatter plot and best fit line of V90 for repeat plans with increasing seroma volumes for 45 cc balloon catheter\nDiscussion\n\nSeroma is formed by acute inflammatory exudates in response to surgical trauma and acute phase of wound healing. Although the pathophysiology of seroma is incompletely understood, the formation seems to be correlated with certain cytokine levels and body mass index [11,19]. With regards to breast brachytherapy, post-treatment seroma formation has been shown to be more likely to result from \"open\" (intra-operative) versus \"closed\" (post-operative) placement of the balloon brachytherapy catheter. Soran et al. [20] showed a 20% rate of persistent seroma (> 6 months) with open placement versus 0% for post-operative placement. Cosmetic outcomes were also noted to be worse in patients with seroma. Watkins et al. [21] showed that the only factor identified as statistically significant for the development of any seroma was catheter placement on a day of resection vs. ≥ 1 day later (59% vs. 33%). Numerous recent imaging studies have shown that the lumpectomy cavity volume changes significantly in time frames relevant to radiotherapy planning and delivery [16,17,22-27]. The range of average volume changes reported in these studies was 22.5-64% [16,27]. The change in volume of the seroma has been shown to affect the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " of drugs, individual differences of drug responses, patient counseling, pharmaco-economic aspects, social aspects of drug use and misuse, correlation between clinical trials and clinical practice, formulations of better therapeutic guidelines, discovery of new indications, new drug discovery etc.\nHypertensive disorders are the most common medical complications of pregnancy with a reported incidence ranging from 6 to 10% [3]. The incidence varies among different hospitals, regions and countries. In addition, these disorders are a major cause of maternal and prenatal mortality world wide [4].\n\nHypertensive pregnant mothers have greater risks for premature deliver, intrauterine foetal death, growth retardation and abruption placenta, they also have an increased risk of vascular injury with thrombotic microangiopaty and co-agulopathy, cerebral haemorrhage, and multi organ injury especially of kidney and liver.\n\nSo as to avoid all such complications, it is better to start the treatment with antihypertensive after assessing correct stage and class of hypertension and always prescribe the safe drug to avoid adverse effects over the foetus and mother.\n\nThe goal of antihypertensive therapy is to protect the mother from the extremes of hypertension and potential morbidity, there by, allowing the pregnancy to continue and the foetus to grow and mature normally. Observations should be made on teratogenic risks, potential adverse effects on foetal cardiovascular of end organ function and a potential impact on foetal growth and uteroplacental haemodynamics and perfusion.\n\nIn contrast with drug utilization study, pharmacoepidemiological studies are the study of effects of the drugs in a large number of persons [5-7]. Recently the definition has been changed as “the study of distribution and determinants of drug related events in population and application of this for the safe and efficacious drug use with special emphases on the resulting medical, social and economic consequences” [8].\n\nThe first study in drug utilization can be traced back to the thalidomide tragedy when SPIERS made an extensive study of prescriptions in an area of Scotland called Stirling-shire to retrieve prescriptions written for thalidomide for majority of mothers[9].\n\nThe errors in prescriptions are not uncommon. This could be due to ignorance or inadequate knowledge about the disease and the pharmacology of the drugs prescribed. Erroruated prescriptions are recognized even in tertiary care hospital [10].\n\nAs prescribing habits differ from doctor to doctor and several factors influence drug prescription. It has been proposed that there are differences in prescribing due to differences in therapeutic approach among doctors in different countries [11].\n\nMATERIALS & METHODOLOGY\n\nTwo teaching hospitals namely Govt. General Hospital and Sangmeshwar Teaching Hospital, Gulbarga attached to M. R. Medical College, Gulbarga were selected for our prospective study. Out of these, one is a Government Hospital and the other is a Private Hospital. This was done, keeping in view the patients of two economic classes (Higher / Lower). Both the hospitals have full fledged facilities of a tertiary care hospital.\n\nThe patients were selected from any of the units belonging to the department. Hence the teaching staff of the concerned units and postgraduate students was involved in the study. The plan of the study was discussed with them and information regarding the use of drugs in detail was sought. Some information was directly taken from the patients. The chief complaints, detailed history of the past and present, vital parameters, physical signs and investigations done were recorded. The total duration of the study was for a period of 2 years i.e., January 2003 to January 2005.\n\nCore Indicators\n\ni) Prescribing indicators :\n\na) Average number of drugs per encounter was calculated by dividing the total number of different drug products prescribed by the number of encounters surveyed.\nb) Percentage of drugs prescribed by generic name was determined by dividing the number of drugs prescribed by generic name by the total number of drugs prescribed, multiplied by 100.\n\nc) Percentage of drugs prescribed from essential drug list was determined by dividing the number of products prescribed from essential drug list of the hospital by the total number of drugs prescribed, multiplied by 100.\n\nii) Patient care indicators:\n\na) Average consultation time was determined by dividing the total time for a series of consultations, by the actual number of consultations.\n\nb) Patients’ knowledge of correct dosage was found by dividing the number of patients who can adequately report the dosage schedule for all drugs, by the total number of patients interviewed, multiplied by 100.\n\niii) Facility Indicators:\n\na) Availability of copy of EDL by stating yes (or) no.\n\nb) Availability of key drugs was calculated by dividing the number of specified products. Actually in stock by the total number of drugs on the check list of essential drugs multiplied by 100.\n\nComplementary Indicators:\nTotal cost of the drugs was calculated by considering the cost for each 10 tab used in the study.\n\nDefinition of risk factors:\nThese definitions are those used by the United States food and Drug Administration (FDA).[12]\n\nCategory A:\nControlled studies in women fail to demonstrate a risk to the foetus in the 1st trimester (and there is no evidence of a risk in later trimesters), and the possibility of foetal harm remains remote.\n\nCategory B:\nEither animal-reproduction studies have not demonstrated a foetal risk but there are no controlled studies in pregnant women or animal-reproduction studies have shown an adverse effect (other than a decrease in fertility) that was not confirmed in controlled studies in women in the 1st trimester (and there is no evidence of a risk in later trimesters).\n\nCategory C:\nEither studies in animals have revealed adverse effects on the foetus (teratogenic or embryocidal or other) and there are no controlled studies in women and animals are not available. Drugs should be given only if the potential benefits justify the potential risk to the foetus.\n\nCategory D:\nThere is positive evidence of human foetal risk, but the benefits from use in pregnant women may be acceptable despite the risk (e.g. if the drug is needed in a life-threatening situation or for a serious disease for which safer drugs cannot be used or are ineffective).\n\nCategory X:\nStudies in animals or human beings have demonstrated foetal abnormalities or there is evidence of foetal risk based on human experience or both, and the risk of the use drug in pregnant women clearly outweighs any possible benefits. The drug is contraindicated in women who are, or may become pregnant. The drugs used are shown in table- 1.\n\nAntihypertensive used against Risk factors used by the United States Food and drug Administrator are categorized into A, B, C, D, X. Statistical analysis was done by simple sampling method.\n\nStatistical Analysis:\nStatistical analysis was done by simple sampling method.\nRESULTS\nA total of 200 prescriptions were collected. 21% were with essential hypertension, 25% were with Transient hypertension, 51% were with Pre eclampsia and 103% were with Eclampsia. The key drug indicators are given in table-2.\n\n
\n\n
\n
Names of Drugs
\n
Sangameshwar Hospital
\n
Govt. General Hospital
\n
Category of drugs
\n
\n\n\n
\n
Tab. Myogard (Nifedipine)
\n
89
\n
82
\n
C
\n
\n
\n
Tab. Ditide (Benzthiazide+Triamterence)
\n
74
\n
38
\n
C
\n
\n
\n
Inj. Lasix (Furosemide)
\n
41
\n
34
\n
C
\n
\n
\n
Tab. Stamlo (Amlodipine)
\n
28
\n
7
\n
C
\n
\n
\n
Tab. Depin (Nifedipine)
\n
7
\n
4
\n
C
\n
\n
\n
Tab. Methyl dopa (Methyldopa)
\n
4
\n
9
\n
B
\n
\n
\n
Tab. Nicardia Retard (Nifedipine)
\n
1
\n
--
\n
C
\n
\n
\n
Tab. Aten (Atenolo)
\n
3
\n
--
\n
D
\n
\n
\n
Tab. Amlong (Amlodipine)
\n
2
\n
3
\n
C
\n
\n
\n
Tab. Aldactone (Spironolactone)
\n
2
\n
--
\n
C
\n
\n
\n
Tab. Alphadopa (Methyldopa)
\n
1
\n
2
\n
B
\n
\n\n
\n\nDISCUSSION\nEclampsia is considered to be a life threatening emerging for both mother & foetus. Magnesium Sulfate is found to be the drug of choice, a (anticonvulsant) as Magnesium Sulfate does not treat hypertension, antihypertensives have to be used which are beneficial to both mother & baby [13].\n\nThe incidence of hypertension in pregnancy was highest among primigravida our study correlates with the same as Cheeley in ", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": "medical\n concern from the review of a premarket submission and/or observed issues from the\n premarket data, a recall, medical device reports (MDRs), case studies, literature, or\n another source.\n- Is the public health issue device-specific or device type-specific?\n- For a device for which a condition of clearance or approval is being considered, can and\n should the public health question be addressed premarket rather than as part of a 522\n order?\n- Is there any other source of data (e.g., MDR review, published literature, real-world\n data sources) or action (e.g., revised labeling, public health notice, recall), or a\n combination thereof, that may be used to address the public health question, instead of a\n 522 order?\n- Does another ongoing study (e.g., premarket approval application (PMA) post-approval\n study as described in 21 CFR 814.82(a)(2) and 21 CFR 814.82(a)(9)) address the public\n health question?\n- What types of 522 postmarket surveillance design(s) should be recommended? Feasibility\n and timeliness of the different types of postmarket surveillance should be considered.\n- What combination of efforts should be considered to address the public health question?\n In addition, when applicable, what changes, if any, are being made with regard to the\n premarket review?\n\nD. Considerations Regarding Pediatric Population Provisions\n\nAs noted above, the statute authorizes postmarket surveillance for class II and III devices that\nare “expected to have a significant use in pediatric populations” and also authorizes the\nAgency to order postmarket surveillance as a condition of clearance or approval for devices\nexpected to have significant use in pediatric populations.4,5 These provisions are not limited to\n\n4 Sections 522(a)(1)(A)(ii) and 522(a)(1)(B)\n5 Since “pediatric populations” is not defined in section 522 of the FD&C Act, for the purposes of 522 orders, FDA\ndevices labeled for pediatric uses, and therefore specific consideration is given to devices with anticipated pediatric use.\n\nNote that section 402(j)(1)(A)(ii) of the Public Health Service Act (PHS Act) (42 U.S.C. § 282(j)(1)(A)(ii)) also states that any “pediatric postmarket surveillance required under section 522” is considered to be an “applicable device clinical trial.” As such, the pediatric postmarket surveillance must be in compliance with the registration and results submission requirements of section 402(j) of the PHS Act (42 U.S.C. § 282(j)). Additional information on these requirements can be found at https://clinicaltrials.gov/.\n\nFDA intends to work with the manufacturer to help FDA determine the appropriate timeframe for a pediatric 522 postmarket surveillance study.\n\nE. Issuance of 522 Order\n\nThe 522 order will specify the device(s) subject to the surveillance order and the reason that we are requiring postmarket surveillance (i.e., the public health question(s)). The order will also typically include any general or specific guidance that is available to assist the manufacturer subject to the 522 order in preparing the postmarket surveillance plan. FDA intends to identify the premarket submission involved (i.e., premarket notification [510(k)], PMA, humanitarian device exemption (HDE) application, or De Novo request) in the 522 order. A 522 order could also include timelines for certain surveillance plan milestones such as subject enrollment, data accrual, and submission of the final report, depending on the plan and timing of the order. If a manufacturer disagrees with any order or condition requiring postmarket surveillance under section 522 of the FD&C Act, a manufacturer may request review under section 562 of the FD&C Act (see section 522(c) of the FD&C Act) and other options are further described in 21 CFR 822.7.\n\nSection 522(a)(1)(A) of the FD&C Act specifies that the Agency may issue a postmarket surveillance order at the time of device approval or clearance or any time thereafter. When a 522 order is being considered for issuance at the time of market authorization, FDA may advise the manufacturer of the potential 522 order and the surveillance plan schedule. Pursuant to Section 522(b)(1) each manufacturer must develop and submit for FDA approval a postmarket surveillance plan within 30 days of receiving the order (see also 21 C.F.R. 822.9 and 822.10). Section 522(b)(1) of the FD&C Act provides that a manufacturer must commence postmarket surveillance not later than 15 months after the day the order is issued. FDA typically considers postmarket surveillance to have commenced when the first subject is enrolled as outlined in the approved surveillance plan. For plans that do not involve enrollment of subjects (e.g., non-clinical studies), FDA considers postmarket surveillance to\n\nis defining pediatric populations to mean patients who are 21 years of age or younger at the time of diagnosis or treatment, that is, from birth through the twenty-first year of life, up to, but not including the patient’s twenty-second birthday. This definition is consistent with the definition of “pediatric patients” under section 520(m)(6)(E)(i) of the FD&C Act, which was added to the FD&C Act at the same time as the pediatric use criterion in section 522.\n\n6 21 CFR 822.5.\n7 Ibid\nhave commenced when data accrual has started as outlined in the approved surveillance plan.\\(^8\\) In FDA’s experience, surveillance plans that require enrolling subjects in a prospectively-targeted manner are more likely to achieve timely completion by following the recommended schedule below from the date of issuance of the 522 order.\n\n- Study commenced within 15 months\n- 20% of subjects enrolled within 18 months\n- 50% of subjects enrolled within 21 months\n- 100% of subjects enrolled within 24 months\n\n### III. Postmarket Surveillance Plans\n\nFDA will assign a postmarket surveillance (PS) order number (i.e., PS####) to each 522 order. Manufacturers should cite the assigned PS number when submitting a proposed postmarket surveillance plan. Surveillance plans are reviewed as supplements to the PS order number. If there are multiple postmarket surveillance questions in a 522 order that require different methodologies to address each question, then a separate postmarket surveillance plan should be submitted for each question, and it is tracked as an individual requirement under the PS order number. FDA will confirm receipt and identify each plan submission by a unique document number.\\(^9\\)\n\nA manufacturer must submit a postmarket surveillance plan within 30 calendar days of receipt of the 522 order.\\(^10\\) Per Section 522(b)(1) of the FD&C Act and 21 CFR 822.17, FDA will review postmarket surveillance plans and respond within 60 calendar days of receipt. FDA intends to promptly review postmarket surveillance plans and work interactively with the manufacturer in order to issue a decision within 30 calendar days of receiving the plan. The manufacturer should prioritize resolution of any surveillance plan deficiencies identified by the Agency and work interactively with the FDA to facilitate that a full surveillance plan review can be achieved within 60 calendar days from the issuance of the 522 order date.\n\n#### A. General Information\n\nThe general content and format of a postmarket surveillance submission is outlined in 21 CFR 822.9. See Appendix 1 for CDRH’s internal checklist for determining whether a submission is administratively complete in accordance with 21 CFR 822.9.\n\n#### B. Elements to Include in a Postmarket Surveillance Plan\n\nAs outlined in 21 CFR 822.10, the following sections must be included in your postmarket surveillance plan:\n\n---\n\n\\(^8\\) For non-clinical surveillance/studies data, accrual milestone reports may be used to track progress.\n\n\\(^9\\) See 21 CFR 822.8.\n\n\\(^10\\) Section 522(b)(1) of the FD&C Act and 21 CFR 822.8\nContains Nonbinding Recommendations\n\nDraft – Not for Implementation\n\n- postmarket surveillance plan objectives addressing the surveillance question(s)\\textsuperscript{11}\n- postmarket surveillance approach (i.e., design) or methodology to be used\\textsuperscript{12} (see Section III.E. of this guidance), we recommend including the hypothesis(es) and success criteria\n- the subject of the study,\\textsuperscript{13} e.g., the patient population (may include subject inclusion and exclusion criteria and definition and source of comparator group)\n- the variables and endpoints for assessing the surveillance question(s),\\textsuperscript{14} such as the primary and secondary endpoints; we recommend including definitions for endpoints, a list of expected adverse events/complications, an agreement to collect unexpected adverse events, and a plan to assess relatedness of endpoints with the device and/or the procedure\n- sample size;\\textsuperscript{15} we recommend including sample size calculation that is statistically justified and based on study hypothesis, where applicable\n- description of the data source (e.g., hospital records", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " Daniels for additional discussion regarding the application of Rawls’ Theory of Justice to health and health care.\n\n\n28 Conscious means that the individual is able to make an informed decision with regard to their consent.\n\n\n44 System accountability implies that harms generally result from multiple failures in the system rather than solely from the actions of one individual.\n\n\n46 See glossary for definition of bias.\n\n\nCONTRIBUTING AUTHORS\n\nEldesia L. Granger, MD, MPH, FAAP, FACP\nThe MITRE Corporation\n\nJessica S. Skopac, JD, PhD, MA\nThe MITRE Corporation\n\nSusan U. Mbawuike, MS, CHES\nThe MITRE Corporation\n\nAnna T. Levin, JD\nThe MITRE Corporation\n\nSusan Dwyer, PhD\nDepartment of Philosophy, University of Maryland, College Park, MD\n\nArnon S. Rosenthal, PhD, MS\nThe MITRE Corporation\n\nJillian Humphreys, MA\nThe MITRE Corporation\nACKNOWLEDGMENTS\n\nGwen Darien, Executive President, Patient Advocacy and Engagement, Patient Advocate Foundation\n\nSusan B. Frampton, PhD, President, Planetree International\n\nMerilyn D. Francis, BSN, MPP\n\nDanny van Leeuwen, RN, MPH, also known as Health Hats\n\nChristoph U. Lehmann, MD, FAAP, FACMI, FIAHSI, Vanderbilt University\n\nRussell C. Libby, MD\n\nThomas H. Murray, PhD, President Emeritus, The Hastings Center\n\nCarolyn Petersen, MS, MBI, FAMIA, Mayo Clinic, Rochester, MN\n\nW. Nicholson Price II, JD, PhD, Assistant Professor of Law, University of Michigan Law School\n\nBen Yelin, JD, Senior Law & Policy Analyst, University of Maryland Center for Health and Homeland Security\n\nBev Acree, MBA, CHIE The MITRE Corporation\n\nCathy Becker The MITRE Corporation\n\nCathy Buck The MITRE Corporation\n\nMallory Carellas, MPH, BSN, RN The MITRE Corporation\n\nSarah T. Corley, MD, FACP The MITRE Corporation\n\nLinda Desens, PhD, RN The MITRE Corporation\n\nSuzanna Dungan, MPH, MBA The MITRE Corporation\n\nSusan Haas, MD, MSc The MITRE Corporation\n\nBernard J. Horak, PhD, FACHE, CPHQ The MITRE Corporation\n\nEdith A. Hughes, DSc The MITRE Corporation\n\nAdrienne D. James The MITRE Corporation\n\nNeeraj Koul, PhD The MITRE Corporation\n\nSybil Klaus, MD, MPH The MITRE Corporation\n\nAmanda Mason-Singh, PhD, MS The MITRE Corporation\n\nJulie S. McEwen The MITRE Corporation\n\nLaura Munro, RN, MHSA The MITRE Corporation\n\nPhuong Ngo, MHA The MITRE Corporation\n\nJanice Nsor, JD The MITRE Corporation\n\nNichole Persing The MITRE Corporation\n\nCatherine M. Petrozzino The MITRE Corporation\n\nCandace J. Rosen, JD The MITRE Corporation\n\nStuart S. Shapiro The MITRE Corporation\n\nJayme Squire The MITRE Corporation\n\nNichole Sweeney, JD The MITRE Corporation\n\nPatrick Tramma The MITRE Corporation\n\nHaleh Vafaie, PhD The MITRE Corporation\n\nErin D. Williams, JD The MITRE Corporation<|endoftext|>[REMOVED]<|endoftext|>Influence of age on outcome of psychological treatments in first-episode psychosis\n\nGILLIAN HADDOCK, SHON LEWIS, RICHARD BENTALL, GRAHAM DUNN, RICHARD DRAKE and NICHOLAS TARRIER\n\nBackground Psychological treatments have been shown to be effective in patients with psychosis. However, the studies published to date have included participants across wide age ranges, so few conclusions can be reached about the effectiveness of such treatments in relation to age.\n\nAims To evaluate outcomes by age in a randomised controlled trial designed to evaluate the effectiveness of cognitive–behavioural therapy (CBT), supportive counselling and treatment as usual.\n\nMethod Outcomes were evaluated in terms of symptoms, social functioning, insight and therapeutic alliance according to age at 3- and 18-month follow-up.\n\nResults Younger participants responded better to supportive counselling than to treatment as usual and CBT over 3 months. Older participants responded better to CBT than to supportive counselling over 18 months. Younger participants showed a greater increase in insight after CBT compared with treatment as usual and supportive counselling, and were more difficult to engage in therapy.\n\nConclusions Young people may have different needs with regard to engagement in psychological treatments. Treatment providers need to take age-specific factors into account.\n\nDeclaration of interest None. Funding detailed in Acknowledgements.\n\nPsychological treatments for psychosis, particularly cognitive–behavioural therapy (CBT), have been shown to be effective in patients with chronic treatment-resistant psychosis and recent-onset psychosis (Lewis et al., 2002; Cormac et al., 2004). However, evaluations of psychological treatments have not usually examined outcomes in relation to a particular patient age group, even though people of different ages may have different therapeutic needs. For example, young adults may have significant developmental issues which may need to be taken into account when developing and delivering treatments. The aim of this study was to evaluate the interaction between age and symptomatic and functioning outcomes in a randomised controlled trial designed to evaluate the effectiveness of CBT and supportive counselling plus treatment as usual compared with treatment as usual alone in first-and second-episode patients with schizophrenia (the Study of Cognitive Reality Alignment Therapy in Early Schizophrenia (SoCRATES) trial).\n\nMETHOD\n\nThe study design was a multi-centre, prospective, rater-masked, randomised controlled trial with an 18-month follow-up. Eligible patients were randomly allocated to one of three treatments, namely CBT and treatment as usual, supportive counselling and treatment as usual, or treatment as usual alone. Phase 1 of the study presented the recovery data for the first 70 days (Lewis et al., 2002). Patients were then followed up and re-assessed by psychiatric interview and examination of hospital records and case notes 18 months after randomisation (Tarrier et al., 2004). A detailed description of the entire SoCRATES sample and methodology has been provided (Lewis et al., 2002), so will be only briefly described here.\n\nParticipants, recruitment and assignment\n\nParticipants were recruited over a period of 26 months. Inclusion criteria for entry to the trial were as follows: either first or second admission (within 2 years of a first admission) to in-patient or day-patient unit for treatment of psychosis; DSM–IV criteria for schizophrenia, schizophreniform disorder, schizoaffective disorder, delusional disorder or psychosis not otherwise specified (American Psychiatric Association, 1994); positive psychotic symptoms for 4 weeks or more; a score of 4 or more on the Positive and Negative Syndrome Scale (PANSS) (Kay et al., 1989) target item for either delusions (P1) or hallucinations (P3); neither substance misuse nor organic disorder judged to be the main cause of psychotic symptoms.\n\nAssessment measures\n\nA number of assessment measures were employed as part of the SoCRATES study at baseline and during the 18-month follow-up period (Lewis et al., 2002; Tarrier et al., 2004). However, only the following measures will be reported here. Measures of symptoms and functioning at baseline and follow-up included the PANSS (Kay et al., 1989) total, positive, negative and general sub-scale scores, the Psychotic Symptom Rating Scales (PSYRATS; Haddock et al., 1999a), the Social Functioning Scale (SFS; Birchwood et al., 1990), the Birchwood Insight Scale (BIS; Birchwood et al., 1994) and two measures of therapeutic alliance, namely the California Therapeutic Alliance Scales (CALPAS; Gaston, 1990) and the Psychotherapy Status Report (PSR; Frank & Gunderson, 1990). Data on demographics, substance use and duration of untreated psychosis were also collected at baseline.\n\nIntervention groups\n\nThe interventions were based on those evaluated in previous treatment studies (Tarrier et al., 1998; Haddock et al., 1999b). The CBT was manual-based and was undertaken by five therapists trained in CBT for psychosis, who were supervised by experienced cognitive–behavioural therapists. At the beginning of the study the therapists were trained in both interventions, and throughout the study they received separate expert and peer supervision on a regular basis to maintain treatment quality. The\naim was for a ‘treatment envelope’ of 15–20 hours within a 3-week post-admission period, plus ‘booster’ sessions after a further 2 weeks, and after 1, 2 and 3 months. Details of the CBT have been provided by Haddock et al (1999b). Supportive counselling was used as a comparison intervention to control for non-specific elements of therapist exposure. The same five research therapists administered both CBT and supportive counselling interventions, according to randomisation. All treatment sessions, both for CBT and for supportive counselling, were audiotaped if participants had given their consent, and the treatment fidelity as judged by independent, expert raters was good (Lewis et al, 2002).\n\nAnalysis\n\nBaseline data were compared according to age using a cut-off point of age 21 years (i.e. 'over 21' and '21 years", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": "ocele if necessary (2-0 PDS); apply TFS anchor at insertion of CL to ATPF sited approximately 2cms superior and 1cm lateral to the ischial spine. Close tunnel and incision in layers.\n\nTable 1. – Patient demographic.\n\n
\n\n
\n
Parameter
\n
Values
\n
\n\n\n
\n
Age (years, range)
\n
60 (37-86)
\n
\n
\n
Parity (median, range)
\n
3 (2-7)
\n
\n
\n
Weight (kg, range)
\n
77.9 (57-142)
\n
\n
\n
Previous hysterectomy (No., %)
\n
21 (52.5)
\n
\n
\n
Sexually active (No., %)
\n
22 (55)
\n
\n
\n
Chronic illness* (No., %)
\n
28 (70)
\n
\n\n
\n\n* Diabetes, asthma, hypertension, macro/morbid obesity, COAD, GORD, depression & anxiety.\nTFS U Sling procedure - for support of mid/lateral pelvic defects:\n\nUse same incision as for cardinal ligament; dissect toward ATFP at its most medial aspect – lcm superior to superior notch of obturator foramen. Deploy TFS into position, adjust without tension and close tunnel and incision.\n\nTFS Uterosacral ligament procedure:\nCreate transverse incision (5-6cm) lcm above vestibule. With aid of hydro dissection of rectovaginal septum grasp and evert inside of posterior vaginal mucosa with 2 tissue forceps progressively whilst dissecting to posterior apex until USLs are identified. With a finger in rectum palpate lateral border of sacrum at approximately S3 facilitating identification of USL insertion. This also enables the surgeon to protect rectum whilst tunneling and inserting prosthesis.\n\nTFS Deep Transverse Perinei Procedure (perineal body repair):\nUsing same incision described in USL TFS, the ano rectal junction is separated from perineal body. Under tension, identify DTP with its attachment to lower 1/3 of posterior medial border of descending pubic ramus. With finger in rectum create a tunnel through DTP to just posterior to ramus in the direction of inferior notch of obturator foramen. Apply TFS prosthesis, tension appropriately, trim tape, close tunnels. Plicate and repair the perineal body if appropriate.\n\nEthics approval was obtained by the Ethics Committee, The Northern Hospital / Northern Health. Safety of the study was monitored throughout.\n\nWritten informed consent was obtained from all patients.\n\nRESULTS\n\n40 women followed up at a minimum of 24 months (Table 2).\n\n70% of cohort suffered from significant medical co-morbidities. 35% had one or more past pelvic organ prolapse procedures.\n\nPerioperative and operative data was predicated on the use of 105 TFS sling applications with the mean of 2.6 slings per patients.\n\nOperative time per sling: 12.5 minutes.\nBlood loss average: 50 mls.\n\nHospital stay average: 60 hours, and this was dependent on the extent of surgery ranging from 12 hours to 72 hours. Postoperative interval before return to normal duties ranged from 72 hours to 2 weeks.\n\nOperative data\n\nSymptomatology of the patient cohort was often multiples of voiding dysfunction, symptoms of prolapse and bowel dysfunction as summarized in table 3.\n\n\nPatient outcomes\n\nImprovement rates at 24 months expressed figure 3. There was an average >85% cure rate of urogynaecological prolapse and stress urinary incontinence. Of the patients sexually active (50%), one patient had transient dyspareunia. There were no tape erosions, anchor slippage or anchor migrations noted in our cohort.\n\nRecurrent symptomatic prolapse in 3 out of 4 patients was due to cervical hypertrophy >4cms requiring cervical amputation at 18 - 24 months. This has lead to our conclusion that concomitant cervical amputation should be considered if cervical length >4cms.\n\n85% of patients who complained of stress urinary incontinence as a symptom were cured at follow up. Only half of this group had urodynamic demonstrable stress incontinence, the others complained of SUI but this was not demonstrable on urodynamic studies. The first group had a definitive pubourethral TFS tape, the other group only had anterior compartment repair (Cardinal ligaments/U sling) and yet this group post-operatively had a cure in stress incontinence symptoms not demonstrable with urodynamics.\n\nComplications\n\nOne rectal mucosal buttonhole injury sustained at initial dissection was treated successfully with primary repair. One rectal serosal penetration with prosthesis was recognized and removed immediately and successfully (Table 4). Both patients had previous multiple perineal and posterior compartment procedures. No implant was inserted under these\n\n
Vaginal Hysterectomy for Non prolapse reason (No., %)
\n
3 (7.5)
\n
\n
\n
Cervical amputation (Manchester repair) (No., %)
\n
2 (5)
\n
\n\n
\n\nTable 2. – Clinical details.\n\nTable 3. – Operative details.\ncircumstances. Retention of urine (failed trial of void) x 2 patients after the pubourethral neoligament procedure; both cases were transient and resolved. There was one case of midurethral release after 21 days with 100% resolution of voiding dysfunction at 4 months. There was one case of trigger point pain of the inferior margin of pubic rami which resolved within 21 days. No haemorrhage, haematoma or tape rejections or infections have been noted.\n\nDISCUSSION:\n\nMany techniques have been devised to address the high failure rates of POP repair using native or biological tissue. Repairs such as sacrospinous fixation have been shown to be anatomically incorrect and have postoperatively caused symptoms such as dyspareunia and other complications including haemorrhage, haematoma, small bowel obstruction and mesh erosion.\\(^6\\) Implantation of mesh sheets for POP seemed promising initially, but complications, sometimes major, have resulted in FDA warnings about the use of large mesh kits within the pelvic floor. These warnings have revived the question “Are large mesh sheets necessary for POP repair?”\\(^5\\)\n\nThe surgical reconstruction of the anatomy is almost exclusively focused on the restoration of lax pelvic floor ligaments. Exact preoperative identification of the anatomical lesions is necessary to allow for exact anatomical reconstruction with respect to the muscular forces of the pelvic floor.\\(^7\\)\n\nWe have found the TFS procedures to be simpler and more anatomically correct than other procedures. From a structural perspective, the small volume of polypropylene tapes provide excellent support and function for grade IV and the more challenging recurrent POP and visceral incontinence.\n\nIn our study 36/40 patients needed multiple anatomical site reconstruction and the with majority requiring apical support. There is evidence that apical repair impacts on anterior vaginal wall prolapse as shown in previous studies comparing sacrospinous ligament fixation and abdominal sacral colpopexy", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " each case we discuss how it illustrates a key challenge in the process of aligning concerns.\n\nOur goal is to illustrate how the differences that underpin the understanding and conceptualization of symptoms and disease between patients and health professionals come to signify central aspects of patient-physician relations and thus the use of eHealth.\n\n4.1. Case #1 – Concepts and meaning differ\n\nWith this case, we bring forth the difference in how illness is experienced by patients and how clinicians conceptualize disease and how this differentiation then comes to designate what is perceived as important and meaningful to each part.\n\nLouis is 51 years of age and has had his ICD for only a year, after suffering a sudden heart attack. The experiences of becoming a heart patient and an ICD-patient in his case melt into each other. Louis suffers from various symptoms related to the heart disease itself, the device, and the medication as well as recovering from the heart attack. Besides this, Louis feels anxious and depressed which he partly ascribes to the trauma of experiencing his own mortality and partly to the lack of continuity of care and the lack of coherence of the information he receives from health professionals and institutions.\n\nBecause of this, Louis is enthusiastic about the prospect for new ways and means of communicating with clinicians and engages very actively in the use of myRecord. He makes several notes on symptoms with the logbook feature (ranging from feeling tired, loss of breath, swollen legs, anxiety, and impotence) and is eager to utilize the preparation module prior to his upcoming in-clinic follow-up. Besides this, he explores the network feature to connect and share experiences with other patients. He praises the potential of the system and explicitly links his positive assessment of its value to his position as a new patient with a great need to feel secure and “in control” and to be able to raise urgent questions and seek continual professional guidance.\n\nHaving completed the preparation via myRecord where he has written an extensive prose text about his symptoms and concerns, Louis has high expectations for the upcoming consultation at the clinic. However, afterwards he is greatly disappointed, as he did not feel that the clinician responded to all the concrete concerns he had raised nor attended to his situation at large:\n\n“I was prepared for the consultation. And that thing regarding vitamin D, he didn’t mention it. He\ndidn’t say anything to me. And regarding the legs, it was me who insisted, insisted, insisted [...] So, I was disappointed with the consultation, really.” (Final interview with Louis, February 2013)\n\nThe cardiologist on the other hand felt that he was able to react to the patient’s primary concern (which he perceived to be the experience of dizziness and loss of breath and which he linked to a possible regulation of medication) and then leave the rest unspoken, since it was not something for him to act on:\n\n“Because he was allowed to write about it and he had made that list, I could just say to him; ‘I can see you’ve written something about this and that. This is the main thing for you,’ and we could then go straight to that topic without having to start all over. So, I think it’s a good way to manage the contact.” (Final interview with cardiologist, local hospital, February 2013)\n\nThe cardiologist further indicates that he thinks the very act by Louis of writing down his concerns would make him feel better. And that Louis would further “feel heard” by knowing that the cardiologist had read through his preparation.\n\nThis case illustrates how the clinician and patient have conflicting perspectives on 1) which concerns are meaningful in the sense of important and relevant for the consultation, and 2) what constitutes proper (re)action. The cardiologist perceives his role as to manage the consultation in the most productive and meaningful way, which in respect to the cardiologist is to ensure that his most important concerns are attended to. Besides this, he acts as a passive listener through myRecord as an act that will indirectly satisfy the patient. The patient, however, feels quite differently and finds much of the follow-up meaningless, stating that in order to be meaningful to him his efforts must result in a “real” (re)action at “the other end.”\n\nFrom the case, we also learn that even though a concern is meaningful to one party, does not mean it becomes meaningful for the other to attend to. This is also a matter of what is allowed (or not allowed) to be put to the front both by patients and clinicians.\n\n4.2. Case #2 – On action and feasibility\n\nWith this case, we take the matter of proper reaction a bit further by illustrating the second challenge that plays an important part in the process of aligning concerns. Namely, that it is not enough for a concern to be meaningful – it needs to be actionable as well.\n\nIn a distributed care scheme clinical concerns are formally, and often also practically, distributed. This means that even if a certain concern of a patient may be of great clinical relevance (e.g. critical side-effects of medication) it will only be relevant for certain clinicians. When patients then write questions and state concerns in a system like myRecord, where a certain clinician is the receiver, the patient must be able to assess what is relevant to whom. In other words, the patient must at some level understand the infrastructure of the distributed care scheme, or the IT-system should indicate or assist in this.\n\nBen (aged 60) is preparing for the upcoming in-clinic device follow-up at the Heart Centre by filling out the step-by-step preparation form in myRecord. When he reaches the section where he can state his most important questions for the clinician he writes that he is very concerned with his blood pressure because he finds himself increasingly exhausted at work when performing his daily tasks. His job is very important to him and he is eager to find a solution so that he can keep working. Ben therefore asks to have it monitored over the course of a day at work. He also poses a question about some over-the-counter-drugs he has been advised to take by a friend. He then finishes the rest of the preparation form and sends it off digitally to the clinic.\n\nDuring the consultation at the out-patient clinic, the lab technician and the cardiologist quickly browse through Ben’s preparation form on their computer screen, while they ask him about his general well-being, his medication and specific symptoms related to the ICD. Ben then asks about the possibility of having his blood pressure monitored and brings forth a referral letter for a local hospital he has received from his general practitioner. The cardiologist briefly answers that it is not something she can get into, and that he will have to take it up with the local hospital.\n\nAfterwards Ben states how he was “disappointed about the fact that they hadn’t read it through carefully. It just goes helter-skelter, you know. [...] They don’t talk about over-the-counter drugs or anything. Then it’s just ridiculous to write about it.” (Final interview with Ben, February 2013)\n\nNow that Ben with great effort had prepared so well using myRecord, he was expecting the clinicians to be prepared too and address his concerns. But he felt that the clinician had not prepared properly and that their lack of interest and action in relation to his concern about this blood pressure and over-the-counter-drugs made his preparation meaningless.\n\nThe cardiologist on the other hand, stated how she, while being with the patient, was able to “browse through what he had written,” and that the preparation form “worked well.” Although she admitted to not having read it beforehand. (Final\nThe cardiologist was not bothered by the fact that she was presented with a concern of the patient that she was not able to act on for organizational reasons, but rather she found it useful to be able to quickly browse through the patient’s concerns and screen out those she did not have to pay attention to.\n\nIn this case we learn that although the concern raised was both meaningful to the patient and the clinician and in fact also clinically actionable, it was not organizationally feasible. One party, the cardiologist, is pleased with the myRecord system and not bothered by being confronted with a concern that she is not able to take action on. But the patient, on the hand, finds the encounter demoralizing and disappointing due to what he perceived as an unsatisfactory “absence of action.”\n\nThe case thus illustrates how some patients are neither able to assess what could become a concern to certain clinicians, nor to accept that the concerns they have articulated are not responded to and acted on by the clinicians. Subsequently, using this version of myRecord entailed great disappointment for the patient in this case and led him to lose his motivation for further use. This supports our claim that motivation for use rests on the existence of aligned concerns and of the system’s ability to support these. In this case it fails to do so as it fails to account for, or compensate for, the distribution of care by facilitating a ‘match’ between the concern of the patient and the concern, in the sense of ability to act, of the clinician in question.\n\n4.3. Case #3 – Alignment of concerns with myRecord\n\nWhile the two previous cases illustrate how myRecord was unsuccessful in supporting meaningful patient participation in some situations, the following case presents how other features of the system used in other situations provided for enhanced collaboration. In remote monitoring, patients are excluded from engaging with clinicians, both parties thus rely primarily on data recorded by the ICD device, which is transmitted for interpretation to lab technicians and cardiologists at the Heart Centre. Patients can therefore no longer ask questions regarding the ICD and raise concerns such as potentially relevant symptoms in the time between the remaining in-clinic follow-ups every second or third year. In design interventions with different version of myRecord we experimented with ways to fulfill the needs of both patients and clinicians by enabling patients to qualify transmissions with their own experiences and by enabling lab technicians and cardiologists to respond in", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " scintigraphic approach to melanoma detection with these reagents was made in the 1970s (4,5). The major drawback of this technique is due to the normal binding of these reagents to all melanin-containing cells (including normal tissues, such as ocular uvea and skin) (6,7).\n\nBecause tyrosine is a melanin precursor, radiolabeled derivatives of this compound (e.g., iodinated alpha-methylytyrosine) (8) have also been tested for melanoma imaging because it is known that this tumor often displays a high rate of melanin synthesis. In addition, numerous attempts have been made to synthesize \"false precursors\" of melanin, for example, thioamides (thiouracil and its derivatives) (9–11). However, none of these radiopharmaceuticals was successful in the detection of malignant melamomas.\n\nA new class of compounds that seems to show interesting properties is the group of benzamides. These tracers have been synthesized to provide specific imaging of the structures of the brain with a high expression of dopaminergic receptors (basal ganglia) (12).\n\nThe ectodermic origin of melanocytes and the presence of melanin in the substantia nigra are the theoretic bases for the application of benzamides in the scintigraphic evaluation of melanoma in humans (13,14). Preliminary results on the use of a tracer of this group ([I23I] N-(2-diethylaminoethyl) 4-iodobenzamide (BZA) were recently presented by Michelot et al. and Brandau et al. in patients with cutaneous and ocular melanomas (15–17).\nThe aim of this study was to evaluate the possibility of using \\( ^{123}\\text{I} \\)\\{(S)-2-hydroxy-3-iodo-6-methoxy-N-\\{1-ethyl-2-pyrrolidinyl\\} methyl] benzamide (\\( ^{123}\\text{I} \\)\\{(S)-IBZM\\}, a tracer usually employed for the study of neuropsychiatric disorders (e.g., Parkinson's disease, schizophrenia, progressive supranuclear palsy and multiple system atrophy), to detect melanomatous lesions in humans.\n\n### MATERIALS AND METHODS\n\n**Tracer**\n\nIodine-123\\{(S)-IBZM\\} is a radiopharmaceutical synthesized by de Paulis et al. \\( (18) \\) and subsequently proposed by Kung et al. \\( (19,20) \\) for the imaging of dopamine \\( D_2 \\) receptors with a traditional gamma camera instead of the expensive and high-technology PET systems. The tracer is the commercially available liquid solution produced by Cygne BV (Eindhoven, The Netherlands)-DuPont Pharma Italia. The radiopharmaceutical had a specific activity greater than 1.85\\( \\times 10^6 \\geq \\text{GBq/mole}, \\) (mean activity concentration = 74 \\text{ MBq/ml}). Quality control procedures performed with thin-layer chromatography showed values of radiochemical purity of more than 97%. A mean dose of 205 MBq of the tracer was slowly injected into the antecubital veins of the patients.\n\n**Patients**\n\nEleven patients with histologically proven metastatic melanoma entered the study. The aim of the study was to verify the effective possibility of imaging metastatic melanoma with radio-labeled benzamides.\n\nThe main characteristics of the patients are shown in Table 1. Short details about their clinical history are summarized in Appendix A. In their clinical history, all patients had undergone surgical treatment of a primary cutaneous melanoma. At the moment of scintigraphy, they showed one or more lesions, which were clinically and instrumentally (with ultrasonography, radiography, CT or MRI) documented as indicating the presence of melanoma metastases. Six of the discovered lesions were cutaneous, and six were lymph node metastases. Three patients had pulmonary localizations, and two presented also had hepatic metastases. The dimensions of the lesions ranged between 5 and 100 mm. Except for the lung and liver metastases, all lesions were surgically removed within a few days (1–4 days) after scintigraphy, and histopathologic analysis was performed to confirm the nature of the lesions. To reduce the thyroidal uptake of radio-iodine, the gland was blocked with potassium perchlorate (400 mg orally) 30 min before the radioactive drug was injected.\n\n**Scintigraphic Technique**\n\nImaging was performed 2, 4 and in some cases 24 hr after the injection with a dual-head, large-field gamma camera (Sopha DSX Bodytrack, Buc Cedex, France) equipped with an ultrahigh-resolution collimator for low energies. Whole-body scans were acquired with a constant speed of 15 cm/min\\(^{-1}\\). Regional planar images were fitted over the lesions and acquired for 10 min with a matrix of 256 \\times 256 \\text{ (zoom = 1.00, pixel dimension = 2.24 mm).}\n\nSPECT was performed in each patient (matrix = 64 \\times 64, 30 sec/step, 64 steps over 360\\degree; zoom = 1.14, pixel dimension = 7.84 mm). Transaxial images were reconstructed by filtered backprojection with a Hamming/Hann filter characterized by a cutoff frequency of 0.5 cycles/pixel (a low-pass filter useful for medium-noise level images). No attenuation and scatter correction were made.\n\nFor radiation dosimetry, we applied the method proposed by the Medical Internal Radiation Dose (MIRD) Committee (Appendix B).\n\n**Blood Clearance and Biodistribution Evaluation**\n\nRadiopharmaceutical kinetic and biodistribution studies were performed in only three cooperating patients. In regard to the study of the tracer's biodistribution, regions of interest (ROIs) were drawn on digital whole-body images 0, 1, 2, 4 and 6 hr after the injection, which surrounded the brain, lungs, liver and gall-bladder. The percentage activity in the organs at any time was obtained by the following formula:\n\n\\[\n\\frac{\\text{geometric mean counts in organ}}{\\text{geometric mean counts in whole body at } t = 0} \\times 100\n\\]\n\nThe blood clearance was determined by venous samples taken at 5, 10, 15, 20, 30, 60, 90, 180, 240, 360 and 420 min. The total blood volume was estimated by means of a formula based on body weight and height \\( (21) \\). The clearance at any time was expressed as a percentage of the injected activity.\nTumor-to-Background Ratio Evaluation\n\nA semiquantitative analysis was performed to define the best tumor-to-background (T/B) ratios, using the ROI method. An important problem in regard to accurate quantitation of tumor uptake is due to the finite point response function of the gamma camera, i.e., the image of the lesion is larger than its true physical size. If the ROI is reduced to the physical dimension of the lesion, not all counts are included. However, if the ROI is made larger, there will be a significant contribution of counts from adjacent normal tissues. To overcome this difficulty and also to minimize the interobserver variability, the tumor uptake was studied by drawing isocontour ROIs around lesions.\n\nA manual ROI was drawn to define the whole tumor area. With respect to the highest count pixel in the ROI, a threshold (percent of the maximum) was fixed. All pixels with values greater than this threshold were attributed to the first area. Another four areas were created by varying the threshold (20%, 40%, 50% and 60% of the maximum). In this way, five different ROIs were obtained for each tumor.\n\nBackground ROIs were drawn near the tumor or in a contralateral region to estimate the binding of the agent and the image contrast of the lesion. Every time, T/B ratios were calculated by dividing the total counts contained in each tumor ROI by the total counts in the background ROI to account for the different number of pixels in the different ROIs.\n\nRESULTS\n\nNeither immediate nor delayed side effects were noted after the administration of the radiopharmaceutical. No cerebral lesions were present in the patients evaluated, and no pathologic uptake was documented in the SPECT studies of the brain. The basal ganglia were normally imaged because of the high selectivity of $[^{123}\\text{I}](S)$-IBZM for $D_2$ receptors.\n\nAfter intravenous administration, the tracer is rapidly cleared from the blood pool. Figure 1 shows that, after 5 min, only about 10% of the injected activity is still circulating. Between the first and second hour after the injection, there is a slight increase in blood activity, which lasts for 1 hr. Thereafter, a slow but continuous decrease characterizes the remaining curve.\n\nImages and biodistribution data indicate a relatively high concentration of the compound in lungs, liver and gallbladder. The hepatobiliary excretion of the tracer is due in part to the high lipophilicity of the compound and explains the presence of its high activity in the intestinal tract. The time–activity curves plotted in Figure 2 show that 24.5% of the injected activity", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " to test their degree of deafness.\nA person with severe or total hearing loss in one ear but normal hearing in the other ear will have no or minimal hearing impairment. They can compensate for the deaf ear by turning their head. Any test of hearing, including formal testing by audiometry, needs to ascertain the loss in each ear separately. The overall degree of hearing impairment is then determined by considering the effects of both deficits in combination.\n\nThe chart below permits this to be carried out and arrive at the percentage disablement based on the occupational deafness scheme used in industrial injuries disablement benefit. In order to be 80% the person has to have a hearing loss of 87 dB or more in each ear. The hearing loss in the better ear is plotted along the vertical axis and the loss in the worse ear along the horizontal axis allowing the degree of disablement to be read from the chart. For example someone with 55 dB loss in the better ear and 88 dB loss in the other (worse) ear would have a 40% degree of disablement. Those with 80% disablement are likely to have very severe hearing difficulties. They would be unlikely to hear normal conversation, hear the television without special aids or understand a shout at one metre in a busy street.\nThe DM should decide the degree of disablement using the following table.\n\n
\n\n
\n
1, 2, 3, kHz average
\n
Pure tone dB
\n
50-53
\n
54-60
\n
61-66
\n
67-72
\n
73-79
\n
80-86
\n
87-95
\n
96-105
\n
106+
\n
\n\n\n
\n
Pure tone HL
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
50-53
\n
20
\n
22
\n
24
\n
26
\n
28
\n
30
\n
32
\n
34
\n
36
\n
\n
\n
\n
54-60
\n
22
\n
30
\n
32
\n
34
\n
36
\n
38
\n
40
\n
42
\n
44
\n
\n
\n
\n
61-66
\n
24
\n
32
\n
40
\n
42
\n
44
\n
46
\n
48
\n
50
\n
52
\n
\n
\n
\n
67-72
\n
26
\n
34
\n
42
\n
50
\n
52
\n
54
\n
56
\n
58
\n
60
\n
\n
\n
\n
73-79
\n
28
\n
36
\n
44
\n
52
\n
60
\n
62
\n
64
\n
66
\n
68
\n
\n
\n
\n
80-86
\n
30
\n
38
\n
46
\n
54
\n
62
\n
70
\n
72
\n
74
\n
76
\n
\n
\n
\n
87-95
\n
32
\n
40
\n
48
\n
56
\n
64
\n
72
\n
80
\n
82
\n
84
\n
\n
\n
\n
96-105
\n
34
\n
42
\n
50
\n
58
\n
66
\n
74
\n
82
\n
90
\n
92
\n
\n
\n
\n
106
\n
36
\n
44
\n
52
\n
60
\n
68
\n
76
\n
84
\n
92
\n
100
\n
\n
\n\n
\n\nIf a person normally wears or could wear a hearing aid, the test to assess the degree of deafness is carried out with the hearing aid being used¹.\n\n¹ SS (DLA) Regs, reg 12(2)(b)\nSeverely mentally impaired with severe behavioural problems\n\n61350 To satisfy this test for the higher rate of the DLA mobility component a person must be entitled to the highest rate of the DLA care component\\(^1\\), be severely mentally impaired\\(^2\\) (see DMG 61351 - 61370) and have severe behavioural problems\\(^3\\) (see DMG 61376 - 61379). The test is cumulative and if any part of the test is not satisfied a person cannot satisfy the test.\n\n\\[^1\\] SS CB Act 92, s 73(3)(c); \\[^2\\] s 73(3)(a); \\[^3\\] s 73(3)(b)\n\nSeverely mentally impaired\n\nArrested development or incomplete physical development of the brain\n\n61351 The first test towards treating a person as being severely mentally impaired is whether they have a state of arrested development or incomplete physical development of the brain, which results in severe impairment of intelligence and social functioning\\(^1\\). Further guidance is available in the Children and Adult Medical Guidance.\n\n\\[^1\\] SS (DLA) Regs, reg 12(5)\n\n61352 The disabilities counting towards severely mentally impaired are defined as\n\n1. **incomplete physical development of the brain** - where a person’s brain has failed to grow properly and this can be seen and assessed\n\n2. **arrested development of the brain** - where a person’s brain is not functioning properly but no physical deficiency is apparent.\n\n61353 There is no precise age at which an individual’s brain stops developing. The DM is entitled to apply the balance of probabilities and consider the age at which brain development ceases as a broad age range, at least into the fourth decade of life and in some cases perhaps into the fifties.\n\n61354 A person cannot satisfy the severely mentally impaired condition unless it can be established that the cause of the mental impairment (for example accident, disease, injury) happened before the person’s brain was fully developed. Degenerative diseases such as Alzheimer’s Disease that begin after the brain is fully developed do not satisfy the severely mentally impaired condition. Difficult cases should be referred to Medical Services for advice.\n\n61355 If a person has arrested development or incomplete physical development of the brain, the DM must then consider whether this results in severe impairment of intelligence and social functioning\\(^1\\).\n\n\\[^1\\] R(DLA) 1/00; SS (DLA) Regs, reg 12(5)\nArrested development or incomplete physical development of the brain and schizophrenia\n\nThe severity of schizophrenic disorders can vary from severe chronic deteriorating illnesses to a group of psychoses which are shorter in duration, easier to treat and leave little after effects. Most schizophrenics will not have arrested development or incomplete physical development of the brain. But for those suffering from the most severe type of schizophrenia (in about 30% of all cases), there is neurodevelopmental damage which is arrested development of the brain.\n\nWhere it can be established that there is arrested development of the brain, the person still has to show that this results in severe impairment of intelligence and social functioning to satisfy the severely mentally impaired test for the higher rate of DLA mobility component (see DMG 61366 - 61369). Medical advice is that below average intelligence or IQ is not a normal feature of schizophrenia. Schizophrenics may respond or react to others in an unusual or different way but this has no bearing on their intelligence. Therefore, someone whose only disability is schizophrenia will not normally be able to satisfy this part of the severely mentally impaired test.\\(^1\\)\n\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " STENTS\n\nEsophageal carcinoma accounts for most cases of dysphagia due to cancer, and usually the tumor is...\nunresectable. Dysphagia may also result from extrinsic compression due to lung cancer or malignant lymphadenopathy. Among many endoscopic and nonendoscopic treatment alternatives for palliation of dysphagia due to cancer, expandable metal stents are one of the main options. They are useful for patients with poor functional status who cannot tolerate radiation or chemotherapy, who have advanced metastatic disease, or in whom previous therapy has failed.6\n\nThe small diameter of expandable metal stents before deployment makes aggressive dilation of the esophagus before or after deployment unnecessary. Despite the substantially higher cost of expandable metal stents as compared with traditional rigid plastic esophageal stents, there are substantial overall cost savings resulting from the reduction in the number of days of hospitalization due to complications.7-9 One study showed that the rate of complications associated with stent insertion was lower overall for expandable metal stents than for plastic stents, but the rate of subacute complications was higher.10 In the United States, expandable metal stents have replaced plastic stents for use in the esophagus.11 Dysphagia is relieved in approximately 90 percent of patients who receive expandable metal stents.7-9\n\nThe data from comparisons of different options for the palliation of dysphagia due to cancer are limited. A retrospective study compared expandable metal stents with a variety of conventional endoscopic palliative techniques in patients with inoperable esophageal carcinoma without tracheoesophageal fistula. Patients with expandable metal stents underwent significantly fewer procedures and spent fewer days in the hospital.12 In a prospective, randomized, controlled trial of patients with esophageal carcinoma, patients with expandable metal stents had significantly more improvement in symptoms and a lower rate of reintervention than those treated by esophageal laser recanalization.13 An advantage of expandable metal stents over other endoscopic palliative methods is that they can be used to treat dysphagia due to compression caused by cancer,14,15 although the improvement in dysphagia is less than for patients with esophageal cancer.14\n\nEsophageal expandable metal stents are also used to treat tracheoesophageal fistulas due to cancer (Fig. 4A).16,17 Tracheoesophageal fistulas develop in patients with advanced esophageal and lung cancer and lead to continuous aspiration of saliva. Tracheoesophageal fistula is the only condition in which covered expandable metal stents may increase survival as compared with other therapies. Although there have been no prospective trials comparing covered metal stents with other types for the treatment of tracheoesophageal fistulas, the covered metal stent is now accept-\ned as the primary treatment option. Closure of the fistula is successful in 70 to 100 percent of patients. For persistent fistulas, placement of an airway stent to close the fistula or surgical esophageal bypass for physiologically fit patients are additional palliative options.\n\nExpandable metal stents are best suited for mid-esophageal lesions. Tumors at the gastroesophageal junction are amenable to stent placement with a high rate of technical and clinical success, but stents at this location produce an open conduit for free reflux of gastric contents, with consequent severe regurgitation and aspiration. Newer stents prevent reflux and aspiration by means of a one-way flap valve on the gastric side of the stent. Placement of expandable metal stents for very proximal esophageal lesions is technically difficult because of the proximity of the stent to the upper esophageal sphincter and the lack of an uninvolved proximal margin. However, in studies of small numbers of patients with dysphagia due to esophageal obstruction caused by cancer high in the cervical esophagus, expandable metal stents were successfully placed and improved symptoms in most patients.\n\nPlacement of an esophageal expandable metal stent can lead to severe complications. Intraprocedural complications include those associated with conscious sedation, aspiration, malpositioning of the stent, and esophageal perforation. Immediate postprocedural complications may include chest pain, bleeding, and tracheal compression, with resultant airway compromise and respiratory arrest. Late complications include distal stent migration, formation of an esophageal fistula, bleeding, perforation, and stent occlusion. Although most migrated stents can be retrieved endoscopically or will simply pass through the gastrointestinal tract, small-bowel obstruction develops in some patients. Approximately 0.5 to 2 percent of patients who undergo the procedure die as a direct result of placement of an expandable metal stent (Fig. 3).\n\nSeveral studies strongly suggest that the rates of delayed esophageal complications caused by expandable metal stents are higher in patients who have previously been treated with radiation, chemotherapy, or both. These complications are presumably due to stent-induced pressure necrosis within devitalized esophageal tissue. Unfortunately, patients who have recurrent or persistent dysphagia or a tracheoesophageal fistula after chemoradiation therapy often have no alternative to a stent for palliation of their symptoms. In contrast to other studies, one prospective study found that patients undergoing chemoradiation therapy after placement of an expandable metal stent had significantly longer survival than patients who received only a stent. However, shrinkage of the tumor by chemoradiation therapy could increase the risk of stent migration.\n\nPatients with esophageal stents must modify their diet to prevent large boluses of food from becoming impacted within the stent. If a stent without an antireflux valve crosses the gastroesophageal junction, strict antireflux precautions and aggressive acid suppression are needed to prevent gastroesophageal reflux and aspiration. If the stent lumen becomes occluded by tissue ingrowth, overgrowth, or hyperplasia, a second stent may be placed through the first stent with good results. Alternatively, endoscopic laser therapy, electrocautery, or photodynamic therapy may be used to treat stent occlusion.\n\n**BILIARY STENTS**\n\nTreatment of obstructive jaundice due to cancer relieves pruritus, improves appetite, and reduces fat malabsorption. Surgical palliation of this condition involves the creation of an anastomosis between the bile duct and the duodenum or jejunum to bypass the obstructed biliary tree. Nonsurgical palliation is achieved by placing stents endoscopically (with the use of endoscopic retrograde cholangiopancreatography), or with radiologic guidance (by the percutaneous transhepatic approach) across the cancerous stricture to restore biliary continuity (Fig. 4B). Insertion of plastic biliary stents provides an effective alternative to open palliative surgical bypass of the biliary tree for the management of obstructive jaundice due to cancer. Unfortunately, bacterial encrustation frequently leads to occlusion of plastic stents, requiring their replacement in terminally ill patients. Plastic stents of larger diameter take longer to become occluded.\n\nThe maximal stent diameter is limited by the endoscopes that must accommodate them and the size of the tract made through the liver when they are placed percutaneously. In comparison with plastic stents, expandable metal biliary stents have a smaller diameter before placement and a larger diameter after placement. Their small diameter before placement makes percutaneous placement less traumatic and permits them to be completely placed during one procedure. Their large diameter after placement eliminates occlusion by bacterial biofilm.\n\nExpandable metal biliary stents are much more costly than plastic stents. In two randomized, prospective trials comparing endoscopically placed, uncovered metal biliary stents and plastic stents for the palliation of jaundice in patients with previously untreated distal malignant bile-duct obstruction, the metal stents had significantly longer patency. Decreases in the rates of endoscopic procedures and rehospitalization offset the initial high cost of metal stents. Similar results were found in a large prospective, randomized trial in which stents were placed by the percutaneous transhepatic route for palliation of distal cancerous biliary obstruction. Expandable metal stents are more cost effective for patients who survive longer than four to six months, whereas a single procedure with placement of a less costly plastic stent would suffice in pa-\ntients expected to have shorter survival.\\textsuperscript{34,35} Another disadvantage of a metal stent in the biliary tree, as compared with a plastic stent, is that the device cannot be removed once it is implanted. Therefore, in patients with potentially resectable cancer, removable plastic stents should be used.\n\nExpandable metal biliary stents may become occluded because of tumor ingrowth or biliary epithelial hyperplasia induced by the stent. Occlusion from either cause may be treated by the insertion of a plastic stent or another metal stent through the original stent.\\textsuperscript{31,35,36} Preliminary studies suggest that occlusion due to tumor ingrowth or epithelial hyperplasia may be prevented by the use of partially covered metal biliary stents.\\textsuperscript{37} Overgrowth of tumor beyond the ends of the stent may result in reobstruction, necessitating placement of another stent.\n\nProlonged patency has been observed in expandable biliary stents used to treat low- or distal-bile-duct obstruction, but not in cases of obstruction by a tumor involving the proximal biliary system at or above the bif", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-health", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-health/part-00-00000.npy", "text": " of values. At first, it appears that Europe doesn’t teach abstinence education — educators will even tell you they don’t. To understand the subtle way it’s presented there, you have to look at how it’s taught here. There are basically two different approaches: the fear-based tactics that had repulsed me, and responsibility-based tactics that I had never had a chance to experience.\n\nAt no time did the European educators I met specifically say “Don’t have sex.” Instead, they’d say “Don’t have sex when you aren’t ready.” Programs offered advice like “Don’t have sex because your partner wants to, have sex because you want to” and “The most important thing is that you be in a committed relationship before having sex.” Not many 15- and 16-year-olds find themselves in strong, committed relationships. So this responsibility-based approach does encourage abstinence, in the most meaningful way. In fact, most recent statistics say that American teenagers first have intercourse one to two years before European teenagers.\n\nThese messages resonate with students because they acknowledge that, in the end, it’s the teenager’s choice to have sex or not. The programs teach teens to make their own decisions. Young people are constantly hearing values from friends, family, and the media. If you pit teacher versus friend, the teacher’s message will probably lose out, but if individuals are taught to make choices for themselves, they’re more likely to postpone having sex.\n\nAfter the trip, I realized that we do teach the responsibility-based approach here too. Often, both strategies exist in the same course. Some programs teach students that having sex before marriage is wrong and explain how “violators” will be punished. Others teach such skills as how to resist peer pressure and how to make your own choices.\n\nI think the European approach is successful because they really take the “responsibility” part seriously. It’s impossible to teach someone to resist social pressure and make their own choices if at the same time you’re trying to pressure them to let you make the choices for them. The teenagers either fail to learn how to make their own choices, or they learn to reject persuasion and ignore the messages they’re being sent.\n\nThe answer is not to find new ways of pressuring teenagers, but to give them the information they need to make their own choices. This may be scary for some adults and parents, but it is time for parents to learn that the values they’ve instilled in their children are alive, and the only way teenagers will act like adults is for adults to stop treating them like children.\nThe Oregon Department of Human Services will be featuring the third edition of the Teen Pregnancy Prevention Action Agenda in the spring of 2002. The updated document serves as a “driver” for the teen pregnancy prevention efforts at the state and community level and has been expanded to seven key strategies:\n\nStrategy 1: Positive community values\nStrategy 2: Comprehensive sexuality education and youth development\nStrategy 3: Abstinence education\nStrategy 4: Contraceptive access\nStrategy 5: Male involvement and leadership\nStrategy 6: Balancing health, safety, and legal issues\nStrategy 7: Young-parent services\n\nThe strategies were developed through a collaborative process featuring the dedication and hard work of many partners from around the state: To view the entire document, visit www.hr.state.or.us/tpp/action_agenda\n\nIn addition to promoting the Directions guidebook for use statewide, the Oregon Teen Pregnancy Task Force is designing training that will help teen pregnancy service providers implement its activities.\n\nLooking in the Right Directions\n\nWe all wonder sometimes where to turn for sound information and resources to use in our work with young people. Now comes this superb service providers’ guidebook on pregnancy prevention for young parents. Appropriately titled Directions, it’s based on lessons learned through many years of cumulative experience by a number of community-based agencies.\n\nInside, you’ll find topics like:\n- Personal Values and Choices\n- Self Worth\n- Personal Relationships\n- Sexual and Reproductive Health\n- The Emotional Aspects of Sexuality\n\nThere’s also an extensive bibliography; notes for facilitators; and resource information including Web sites, books, and videos.\n\nDirections is available via e-mail or on diskette in PDF format (requires Adobe Acrobat; available free on the Web). A limited number of binder-ready printed copies are also available. Contact Travis McAlister at Insights Teen Parent Program by phone (503) 239-6996 x238, or by e-mail: travism@insightstpp.org. Please specify the format you want.\nI'm sitting at my desk at the clinic when a group of unfamiliar teen males comes in. A couple are dressed all in black except for the obscene words on their T-shirts. Some look sullen or hostile; others wear an unreadable game face. At least one has lots of metal on his face. They're loud and boisterous - laughing, joking, punching each other and looking as if they might crash into the walls. I tense up and start to deal with them as if they're an annoyance at best and a threat at worst. They react and leave and, big surprise, never come back. What we have here is a failure in adolescent services, because of male profiling.\n\nWe've all heard about profiling, of course. In the case of males, it exists when we assume the worst about the intentions and potential behavior of the young men we encounter. In adolescent health care, it often shows up as programs that ignore the appropriate developmental needs of males, but do focus on getting them to stop whatever it is they're doing that's risky, wrong, or harmful. Granted, these are all appropriate goals when applied to pregnancy and STD prevention, anger management, and violence prevention. But if that's where our services for guys start and stop, we're seriously shortchanging them.\n\nBoys make up the vast majority of school suspensions and expulsions, special education classes, dropouts, abusers of alcohol and drugs, victims of violence and bullying and successful suicides. They commit most of the vandalism and acts of violence in the school community. There is clearly a need for male-oriented services, yet it seems most school programs and health and social services (outside of sports and corrections) have been developed by females for females.\n\nBut the issue goes beyond lack of appropriate services. Boys are conditioned to believe that “real men are tough.” The most damaging consequence of this is that young men are often cut off from knowing and expressing their feelings, other than anger. Because vulnerability is equated with weakness, they're unable to ask for help with their problems.\n\nImagine the stresses of navigating the teen years while trying to cope with the damaging and limited vision of manhood that seems to prevail in American popular culture. In a sort of psychological “piling on,” many boys lack humane and nurturing male role models to help them through this difficult time.\n\nIt’s no secret that boys learn and act differently from girls. They tend to be more physical, socialize in larger groups, and have an active learning style. Surging hormones can make their behavior unpredictable and, yes, baffling at times. This is all normal, and we need to make allowances for it while setting reasonable limits.\n\nTo give boys their due, we should assess our programs, facilities, and services. Do they invite males in? Are they guy-friendly? Are they aware of young men’s struggles and needs? If not, we can take steps to correct the imbalance.\n\nA good place to start is with the excellent report by Howard Hiton, a Portland-area counselor and expert in male adolescent development. Building on Strengths, Helping Boys Succeed in Portland Schools provides specific strategies and approaches that address the needs and struggles of adolescent males. It lists valuable and helpful local and national resources, appropriate for health and social service agencies as well as schools. Copies are available for $15.00/issue + $1.00 shipping & handling. (Originals are spiral bound). Contact person is Bonnie Randolph, Student Services Office of Portland Public Schools, (503) 916-5840, x328.\n\nMalachy Grange is a community health nurse at The School-Based Health Center, Marshall High School.\nMale Profiling Can Show Up Anywhere\n\nA quick inventory of the posters in my own teen health center showed this: a guy throttling a girl (dating violence); a guy abandoning his pregnant girlfriend (irresponsibility); a guy doping a girl’s drink (date rape). The only positive image was that of a football player saying no to drugs. These posters were created by well-intentioned professionals to address serious issues. But by concentrating so heavily on the negative side of male behavior, they create a male-unfriendly environment and reinforce an unhealthy image of manhood that’s becoming a stereotype in American media and society. -MG\n\nDealing With Reality\n\nSurgeon General’s Call to Action\n\nLast June, U.S. Surgeon General David Satcher released a long-awaited report encouraging Americans to respect “a diversity of sexual values,” recognize what science shows to be effective, and engage in an open discussion about sexuality.\n\n*The Surgeon General’s Call to Action to Promote Sexual Health and Responsible Behavior* details the current landscape of sexual activity: 12 million Americans are infected by sexually transmitted diseases each year, including 40,000 cases of HIV; nearly half of all pregnancies are unwanted; over 100,000 children are victimized by sexual abuse annually. Dr. Satcher suggests that thorough and medically accurate sexuality education is critical to combating these social ills.\n\nThe report encourages abstinence until people are involved in a “committed, enduring, and mutually monogamous relationship, unlike programs that urge abstinence until marriage.” “I have to deal with reality,” Dr. Satcher noted. In fact, studies show that students who have been instructed on both abstinence and contraception are more likely to postpone sexual involvement and", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " and nature, the past, the present, and the future—in the profound synthesis of all knowledge, and the ideal coordination of human society as a whole—here he stands supreme. And it is doubtless on this ground that Comte has called the Divine Comedy \"the incomparable epic, which still forms the highest glory of human art.\"\n\nThis is no place to dilate on the supreme gifts of Dante as poet, or to enter on the wide field of his numerous works. It is with the poet only that we are here concerned, and with the Vision alone. Nay, since this in itself is an inexhaustible field, we will confine our present notice to a single point, the relation of the Divina Commedia to the evolution of modern history. It is an accepted truism that this \"Sacred Poem\" sums up the spirit, the knowledge, the religion of the Middle Age, whilst it created the Italian language, inspired religious art, and founded modern literature. Its influence is still growing, six centuries after the manhood of the poet, and it idealised all that man had felt, believed, and done in at least as many centuries before his birth. The whole range of Catholic Feudalism seems to defile before our eyes, and beyond it we see visions of the heroes and poets of antiquity and the prophets and lawgivers of the East. Dante, it is often said, knew all that could be known, in an age when this was a feat still possible for a single mind. We need no testimony to convince us of the vast range of his learning. \"He was,\" as Villani truly says, \"perfect poet and philosopher, with the most exquisite style that the language ever produced.\" He seems to have absorbed all philosophy, all theology, all science, all poetry, all art and all history, as these were then understood by the greatest intellects. And it was an age of great men: for during Dante's life there were living Roger Bacon, Albert the Great, Aquinas, Duns Scotus, Giotto, Petrarch, Saint Louis, Rudolph of Hapsburg, and Edward I.\nIn form, in colour, perhaps in design, the Vision represents the Catholic Feudalism which culminated in the Crusades. But Catholic Feudalism in its essence had expired about the time of Dante's birth with such men as Saint Louis and Simon de Montfort; and when Dante wrote a new era had begun. There is profound significance in this, that Dante's place in the Polity is with the Western Revolution and not with the age of the Crusades, the Friars, and Innocent III. The Vision, indeed, is saturated with the spirit of modern thought, of secular and not clerical morality, of civic energy, and of the supremacy of science. It is true that Dante could not foresee the results of later time, and the mould of his imagination is Catholic in religion and Feudal in association. But no reformer of Church and State more fiercely denounced Popes and Cardinals, was more zealous for the right of private judgment of all things belonging to God or man, or more proudly true to republican simplicity and civic right. Enough has been said of Dante as Catholic mystic and as Imperialist liege-man. He was all this; and there are whole cantos which breathe the spirit of St. Bernard and of Godfrey de Bouillon. But we are too apt to forget that the deeper and more potent spirit of the Vision is the inquiring mind of Roger Bacon, Aquinas, and Montaigne; that Dante cares for authority as little as Francis Bacon or Hobbes; that he is as redolent of the Renascence as Raphael or Shakespeare; that he is a gentleman, a soldier, a lover, and a citizen. As Villani finely says: \"For his virtues, science, and worth he seems to us so great a citizen, that it is befitting to give him perpetual remembrance.\"\n\nOf the man himself, his own writings, the most pathetically personal in all literature, give us a vivid knowledge. He was born neither saint nor mystic: he was a man of the world, of audacious brain, of varied culture, with an exquisite taste for all forms of beauty and enjoyment. If remorseless criticism finds no authority for the portrait of the man of sorrows which is indelibly associated with our conceptions of the poet, it is difficult to resist the impression that, in the recovered fresco of the Bargello at Florence, we have the true features of the youth of such exquisite sensibility and genius before pain had hardened them into the stern mask that is familiar to us as the Poet of Hell. He suffered cruel disappointments, and he fell into many errors. He seems deeply conscious of his own faults, of pride, passion, and ungentleness. He seems unconscious how utterly unfit he was for the political and public career to which he devoted the first half of his life; and the famous State letters of his mature years, with all their noble enthusiasm and passion, are amazing instances of the philosopher who meddles with affairs. In truth, the saepe indignatio, which never ceases to lacerate his heart, not a little detracts from the poetic beauty of his work. History and tradition record the strange awe with which his contemporaries watched the lonely man \"who had seen hell\"; and we can well understand how his fellow-citizens, with Villani, found his learning somewhat too \"arrogant, super-subtle, and disdainful, and found him, as philosophers are apt to be, rather ungracious in converse with the unlearned.\"\n\nTruly he had his faults as well as his griefs. Yet indignation with him seems ever ready to blossom into most intense tenderness, pride towards men reaches forth into ideal humility in the sight of God, and\nthat saturnine outside covered profound depths of love inexhaustible and pure. Thus it comes to pass that, with all its obscurity, bitterness, and gloom, the Vision has become the centre of a literature more full than that which gathers round any other poem, and that it is hailed by Positivism as the foundation of the Bible that is to be. [P. E.]\"\nTROUBADOURS, from the end of the 11th to the end of the 13th Century.\n\nAuguste Comte has remarked (Pos. Pol. iii. 373-4) on the fitness of the Middle Age for poetry in all respects but one. Defensive war supplied nobler themes than aggressive war; the ethical tone had been raised by chivalry and respect for womanhood. On the other hand, the social state was too unsettled for permanent work; language itself, the index to so much else, was rapidly shifting. The Middle Age produced the Nibelungen-Lied and the Chanson de Roland. But the modes of life portrayed in these two poems were, like their language, undergoing rapid and often violent transformations.\n\nThe case was otherwise with that southern part of Gaul whose name of Provence indicates its early reception of Roman civilisation, and which stood somewhat aside from the central stream of barbaric invasion which devastated Italy. Yielding to the Goths, the most sympathetic of the northern invaders, it was saved from the Vandals and the Huns. In that favoured climate a civilisation grew in which Roman culture was more peacefully blended than elsewhere with the new life of the West. It is not surprising, therefore, that the Provençal language should have reached maturity earlier than any of the Romance languages, and that Dante should have been tempted to use it in preference to the common speech of Tuscany for his great poem. In Dante's time this language possessed a vast poetical literature, written and oral, extending over at least two centuries. Epic romance and love-songs were the principal themes, though political satires (sirventes) were not wanting. The composers passed under the name of troubadours (finders, inventors), corresponding to the word trouvères applied to the minstrels of northern France. They wielded great social influence; were patronised by monarchs like Richard I. of England and Alfonso II. of Arragon, and their society was courted by ladies of the highest rank, sometimes with tragic results.\n\nTwo of those poets are mentioned by Dante. The first was Arnaut Daniel, whom he meets in Purgatory (canto xxvi.), and addresses as \"the best workman of his mother-tongue, who surpassed all the rest in songs of love and tales of romance.\" Arnaut replies in the Provençal tongue. In his treatise on language, Dante says that he owes to him the lyrical form of some of his poems. He composed epical romances, one on the Rinaldo, of Carlovigitian legend; another on Lancelot, perhaps the one which proved fatal to the lovers of Rimini. The second was Bertram di Born, a fierce warrior of Gascony, who fomented dissension between Henry II. of England and his eldest son, and is on that account placed by Dante in the Inferno with Mahomet and other dividers of men (canto xxviii.). Others of note were Peire Vidal (1150-1210 A.D.), Guillem de Cabestan, of the same date, and Folquet, afterwards Bishop of Toulouse, and a fierce crusader against the Albigensian heretics. The same causes which brought into Southern France a premature Renaissance brought also a premature religious revolt, suppressed by Innocent III.\nwith stern severity. There were good reasons for the Albigensian crusade, stained though it was with needless cruelty. But it was fatal to the growth of troubadour poetry.\n\n\n**BOCCACCIO (Giovanni", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": ">\n
\n
Juvenal
\n
64
\n
\n
\n
Kamiša Mera
\n
26
\n
\n
\n
Kant
\n
528
\n
\n
\n
Kempis, Thomas à
\n
362
\n
\n
\n
Kepler
\n
590
\n
\n
\n
Klopfstock
\n
359
\n
\n
\n
Kosciusko
\n
574
\n
\n
\n
Lacaille
\n
880
\n
\n
\n
Lafayette, Mme. de
\n
555
\n
\n\n
\nINDEX OF BIOGRAPHIES\n\nLa Fontaine, 322\nLagrange, 613\nLamarc, 638\nLambert, John, 570\nLambert, Mme. de, 566\nLanfranc, 238\nLea-tae, 21\nLe Valette, 265\nLavoisier, 626\nLeibnitz, 522\nLeo the Great, St., 382\nLeo IV., 383\nLeonidas, 199\nLercy, Georges, 509\nLercy, Pierre, 361\nLe Sage, 457\nLessing, 438\nLesseur, 383\nLaundrupus, 90\nL' Hopital, 554\nLinnena, 683\nLocke, 503\nLongus, 50\nLouis of Granada, 354\nLouis, St., 264\nLouis, St., 254\nLouis, xiv., 564\nL' Ouverture, Toussaint, 577\nLoyola, Ignatius, 241\nLucan, 72\nLucian, 65\nLucretius, 68\nLuke, St., 209\nLully, 470\nLully, Raymond, 489\nLycurgus, 10\nLylyippus, 56\nMADISON, 675\nMecenas, 108\nMagellan, 978\nMahomet, 87\nMaistre, J. de, 482\nMalebranche, 504\nManco-Capac, 25\nMansoni, 847\nMarcian, 258\nMaria de Molina, 545\nMarina, 276\nMariette, 400\nMaritius, 188\nMatilda of Tuscany, St., 297\nMaupertuis, 514\nMaximil., 502\nMenander, 63\nMencius, 21\nMenu, 15\nMercer, Elisa, 398\nMetsastasio, F., 445\nMichael Angel, 329\nMiltiades, 169\nMilton, 364\nMoliere, 463\nMonge, 410\nMonica, St., 214\nMontague, Lady, Mary, 456\nMontaigne, M. de, 492\nMontalvan, 480\nMontesquieu, 518\nMontgolfier, 490\nMore, Sir Thomas, 406\nMoro, 401\nMorgan, 654\nMoses, 8\nMotteville, Mme. de, 453\nMozart, 475\nMurillo, 384\nNAPIER, 378\nNasir-ad-Din, 149\nNearchus, 148\nNerva, 195\nNewton, 615\nNuma, 11\nOden, 591\nOrigen, 115\nOrpheus, 9\nOssian, 18\nOtho the Great, 260\nOvay, 489\nOvid, 71\nOxenstier, 561\nPALESTINA, 467\nPalissy, Bernard de, 410\nPapin, 402\nPapinian, 197\nPappus, 187\nPascal, 501\nPaul, St., 206\nPelayo, 269\nPenn, W., 247\nPerigeuse, 466\nPericles, 178\nPeter the Hermit, 298\nPetarch, 351\nPhaedrus, 64\nPhidias, 58\nPhilp, 177\n
\n\n
\n
Name
\n
Page
\n
\n\n\n
\n
Philo of Alexandria
\n
111
\n
\n
\n
Philolaus
\n
97
\n
\n
\n
Philopæmen
\n
160
\n
\n
\n
Phocion
\n
178
\n
\n
\n
Pilpay
\n
61
\n
\n
\n
Findar
\n
47
\n
\n
\n
Plato
\n
117
\n
\n
\n
Plautus
\n
62
\n
\n
\n
Pliny the Elder
\n
159
\n
\n
\n
Pliny the Younger
\n
105
\n
\n
\n
Plutarch
\n
158
\n
\n
\n
Poinsof
\n
609
\n
\n
\n
Polo, Marco
\n
372
\n
\n
\n
Polybius
\n
181
\n
\n
\n
Pombal
\n
566
\n
\n
\n
Pousain
\n
333
\n
\n
\n
Praxiteles
\n
55
\n
\n
\n
Priestley
\n
619
\n
\n
\n
Prometheus
\n
7
\n
\n
\n
Ptolemy
\n
148
\n
\n
\n
Ptolemy I.,
\n
179
\n
\n
\n
Pulcheria, St.
\n
222
\n
\n
\n
Pythagoras
\n
98
\n
\n
\n
Pytheas
\n
142
\n
\n
\n
Rabelais
\n
318
\n
\n
\n
Racine
\n
441
\n
\n
\n
Raleigh
\n
278
\n
\n
\n
Ramus
\n
491
\n
\n
\n
Raphael
\n
336
\n
\n
\n
Regulus
\n
186
\n
\n
\n
Rembrandt
\n
322
\n
\n
\n
Richard Coeur de Lion
\n
273
\n
\n
\n
Richardson
\n
462
\n
\n
\n
Richelieu
\n
567
\n
\n
\n
Riquet
\n
412
\n
\n
\n
Ritter
\n
625
\n
\n
\n
Robertson
\n
524
\n
\n
\n
Römer
\n
598
\n
\n
\n
Rojas
\n
431
\n
\n
\n
Roland, Mme.
\n
453
\n
\n
\n
Romulus
\n
11
\n
\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": "3 B.C. on the great temple of Zeus at Olympia, where he made the gold and ivory colossal statue of Zeus, the wonder of antiquity, and an even greater and more imposing work than the Athene of the Parthenon. He seems to have died in 432 B.C., in prison, on the second charge of impiety, though by some accounts he was condemned and executed by the people of Elis.\n\nThe principal works of Phidias, besides the sculptures of the Parthenon, were the three colossal figures: the bronze Athene Promachos of the Acropolis, the outline of which is preserved to us on coins, and the two chryselephantine statues, that of Athene inside the Parthenon, and that of Zeus at Olympia. Of the former we have the general outline in existing statuettes, and of the latter we have indications on coins, and busts supposed to be imitated. Of the effect of this extraordinary form of art, which Phidias is said to have invented, one which could arise only out of an almost idolatrous mythology, we can have but a vague conception. In these chryselephantine statues the figure was made of a framework of hard wood, cypress or ebony. On this were superimposed plates of ivory and gold—the whole of the uncovered parts of the figures being of ivory, and the robes of gold; precious stones, chasing, and various metals being also employed. The Olympian Zeus was regarded as one of the wonders of the world; it survived for some seven or eight centuries, well into the Christian period; and it was uniformly spoken of with enthusiasm by the ancients who saw it. However much so complex and artificial a mass differs from our conception of plastic art, we cannot doubt the unerring genius of Phidias, and the unanimous verdict of antiquity; and we are forced to believe that these stupendous figures were the most imposing and beautiful ever produced by man.\n\nThe other principal works of Phidias were the statues of the Parthenon, of which the ruined fragments, known as the Elgin Marbles, in the British Museum, present us with a basis of conception. Although we are unable to say that any single work is from the hand of the sculptor himself, it has never been doubted that the colossal figures of the two pediments, and the fragments of the frieze, spring directly from the brain of the master. The world is agreed that they exhibit every quality of the sculptor's art in absolute perfection. Technical execution, sublimity of conception, beauty, truth, dignity, fitness, unerring judgment, fertility of invention, and mastery of composition are all displayed in equal power, and in the highest conceivable perfection. If there be one quality which impresses the beholder first as well as last, it is ideal beauty and grandeur. Phidias is said to have declared that he drew his ideal of the gods from the description of Homer. And it is in the Homeric quality of serene majesty and simple beauty that his art excels.\n\nHis work is as free as that of Homer himself from any taint of exaggeration, affectation, false emphasis, or sensuousness. It is always at once sublime and perfect. It was a saying of the ancients that \"the hand of Phidias alone of men could make the image of the gods.\" With this power of ideal majesty, he combined a full technical mastery over\nevery form of plastic art. He himself claimed no other superiority except that of \"accuracy of work.\" We are told that his skill was equally surpassing in representing the grasshopper and the bee as the gods of Olympus. He was a consummate master in marble, bronze, ivory, gold, or ebony; in sculpture, in relief, in engraving, in chasing, in enamelling; in colossal statues, and in the most delicate ornamentation of a moulding or a fringe. He had working under him, we are told, architects, sculptors, masons, bronze-founders, goldsmiths, ivory carvers, chasers, enamellers, and dyers. His genius was able to bring the work of all into perfect harmony.\n\nHis influence over all subsequent art was almost equal to that of Homer in poetry. Whilst all subsequent masters and schools had the defects of their qualities, the ancient and the modern worlds have never suggested a shortcoming in Phidias, or a single quality in which he was weak. Consummate judgment and unerring taste control the most sublime and lovely visions of beauty. It is significant that, whilst his representations of the nude surpass in knowledge and technical mastery any others known, we have no single extant example in which he presented the female form, even partially undraped. His Venus on the frieze, like all his other goddesses, is completely draped. Nor must it be forgotten that we have no single statue by Phidias, in the true sense of the word. The Elgin Marbles are all, without exception, architectural decorations. Even the so-called Theseus and the River God, sublime as they are, are the ornaments of a group placed in a pediment, 50 feet above the spectator; and, consequently, like the figures in the metopes or the frieze, they are entirely subordinated to the conditions of the architect.\n\nNor are we able to judge whether the great artist was equal to present human expression and emotion with the same power that he has presented the human form. No single head has survived to us uninjured of any of the larger figures that we can certainly ascribe to Phidias. But in the extant busts of Jupiter we may recognise faint copies of the majesty which he could give to the King of the Gods. We cannot assume that even Michael Angelo or Raphael surpassed Phidias in power of expression; and they assuredly did not surpass him in invention, in knowledge, or in sublime and serene beauty. There is every reason to believe that Phidias was the most perfect and complete genius who ever appeared in the arts of form: the one artist in whom we find nothing wanting, and of whom we know no failure. [F. H.]\n\nÆSOP: PILPAY\n\nÆSOP, possibly the 6th century B.C.\n\nÆsop is the reputed author of a collection of moral fables, which, in various forms, has had a wide vogue and great influence in Europe. About the man we know absolutely nothing. The fables were shown by Bentley to be probably of Indian or Persian origin. The form of imagination which gives speech and other human characteristics to the lower animals is common and congenial to the early stages of thought, but it appears very rarely in Greek literature. We have an instance in both Hesiod and Æschylus, and in one or two other early Greek poets, but not elsewhere. In placing Æsop at the head of the series of writers of whom Aristophanes is chief, we may recognise the fact that in this \"beast epic\" is the earliest form of that humorous description of the faults of human life which, in its fully developed shape, we call \"comedy\" (see Pos. Pol. iii. 234). The Fables of Æsop were versified in later years by Phaedrus in Latin, and by Babrius in Greek. But it was another writer, now almost forgotten, who kept these fables alive during the Middle Ages, enjoying for many centuries a celebrity second only to Virgil—the half-barbarous elegiac fabulist, Avianus. [F. S. M.]\n\nMahaffy: History of Greek Literature, i. 98, etc.\n\nPILPAY.\n\nThe name of Pilpay or BIDPAI is entirely unknown to the Hindoos. The Fables and Proverbs which pass under his name consist mainly of the Pancha Sutra, or Five Sections, and the Hitopadesa, or Friendly Instructor, which were translated into Persian in the fifth century A.D. They were afterwards translated into Arabic; and in 1709 the Persian version was translated into French under the title of Les Consels et les Maximes de Pilpay, which appear in English as The Instructive and Entertaining Fables of Pilpay. The name of Pilpay appears to have been first attributed to the collection in Persia, the reputed Hindoo author being Vishnu-Sarma.\n\nThese fables are the earliest collection in the world, and greatly surpass in humour and in variety of matter and of lesson the Fables of Æsop. There is at the same time similarity enough between the two collections to make us believe in a common source. The Sanskrit fables are supposed to be told by their author for the education of the children of a certain rajah, and form a wonderfully interconnected series. The animals introduced relate other stories to one another, and deliver many proverbs and practical moral precepts, which form a much more important part of this collection of fables than of any other. [F. S. M.]\n\nPLAUTUS (Titus Maccius Plautus), abt. 254-184 B.C.\n\nPlautus was born in Umbria about the middle of the third century B.C. He is said by some to have been a slave and afterwards a stage carpenter. But these may be stories invented to account for his knowledge of slave character and his connection, though a man of humble origin, with the theatre. He produced his first play in 224 B.C., and wrote without a rival till his death forty years later. Twenty of his plays remain.\n\nLike his successors, Cecilius and Terence, he was largely indebted to Menander and the later comedians of Athens, though he is probably more original than either of them. This method of", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": ". It consists of thirteen books, of which the first two treat of the earth as centre of the universe, of the motion of the stellar spheres by which the day, the year, and the precession of the equinoxes is explained; his table of chords is described and applied; astronomical time is defined, the dependence of climate on latitude is shown. The third book deals with the theory of the sun; the fourth and fifth with that of the moon; the sixth is given to eclipses; the seventh and eighth to the stars; the last five books to the planets.\n\nPtolemy frequently mentions Hipparchus; but it has been shown in detail by Delambre and others that he has borrowed from him far more than he has acknowledged. But what remains as his own is of much importance. He discovered the second inequality of the moon's motion called evocation; the first inequality, due to the excentric position of the earth in the lunar orbit, and called, as in the case of the sun, the equation of the centre, had been discovered by Hipparchus. Ptolemy found that the equation of the centre was diminished when the moon was in conjunction with or opposition to the sun, and was increased in quadrature, i.e. when the angular distance between the moon and sun was 90°. The amount of this inequality depended also on the combination of the places of the lunar apsesides with that of the conjunctions. Ptolemy's estimate of this second irregularity, called by astronomers evocation, was very nearly accurate, and is a discovery of great value.\n\nPtolemy represented lunar as well as planetary motions by supposing the body considered to move on the circumference of a small circle, the centre of which was carried round the earth; a mode of representing complicated periodic motions first suggested by Apollonius. By varying the size of the subsidiary circle and the direction of motion, all these irregularities became susceptible of geometrical treatment. The hypothesis was strictly legitimate; the more so that none but circular arcs were amenable to calculation. A further discovery of vital import to astronomy is due to Ptolemy—that of the refraction of rays of light when passing from a thinner to a denser medium. It is spoken of not in his astronomical work, but in his *Optics*, which therefore must have been written later. Arranging at the extremities of one of the diameters of a circle and at the centre three coloured spots, so that when the circle was half immersed in water, they appeared to be in a straight line, he was able to determine with precision the refraction for each angle of the incident ray. Applying this to astronomy he shows that refraction, greatest at the horizon, and diminishing as the star approaches the zenith, disappears when the ray is vertical.\n\nALBATEGNIUS, 380 A.D.\n\nIn the ninth century begins the fertile period of Arabian science, protected and encouraged by the Khalifs of Baghdad, especially by Al Mamun, son of Harun-al-Raschid, who spent much time in forming a collection of Greek works on science. Ptolemy's *Syntaxis* was translated in 817 by Isaac ben Honain, and was carefully studied by the astronomers of Baghdad and Damascus. His observations were carefully repeated, but without any marked advance of science till the time of Mohammed ben Geber Albatani; so called from Batan, in Mesopotamia, the place of his birth; in Western style he is known as Albategnius. He was a Syrian prince; able and willing to spend wealth on costly observatories established at Aracte and also at Antioch. The result of his labours is contained in a treatise on the science of the stars and their motions.\n\nIn trigonometry, Albategnius introduced an important innovation—the use of the semi-chord of the double arc for the chords employed by Hipparchus and Ptolemy. This semichord was called in Arabic *gib*, i.e. pleat or fold, translated into Latin as *sinus*; such, at least, is the most probable explanation of the word. The introduction of the sine simplified the labour of calculation. Of the other trigonometrical lines, the tangent appears to have been known to him, but not used; the cosine and secant were of later invention.\n\nIn astronomy, Albategnius, repeating with greater accuracy and better instruments the observations recorded by Ptolemy, determined the annual amount of precession as 54″, instead of 36″; a very much nearer approximation to the true amount. He discovered also what in Ptolemy's time was unknown—the annual motion of the solar apogee, which he fixed at 25″. His determinations of the eccentricities of the solar orbit, of the obliquity of the ecliptic, and of the length of the year, were superior in accuracy to those of the Greeks. The year as fixed by him was two minutes and a half too short, an error much smaller than that of Hipparchus, and which, when examined, appears to be due to an incorrect, or even fictitious, observation of Ptolemy.\n\n[J. H. B.]\n\nDelambre: *Astron. du Moyen âge*.\n\nNASIR-ED-DIN (Mohammed Ben Hussein), b. 1201, d. 1274 A.D.\n\nMohammed, the son of Hussein, Al-Thussai (of Thous), from the place of his birth, was a Persian astronomer of the thirteenth century. He was a favourite of Holagou Khan, grandson of Zingis, the great Mogul who overran Persia, and destroyed the Abbasid dynasty in A.D. 1258 (Gibbon, ch. lxiv.). The chief fixed his government at Maragha, where he collected men of science and built an observatory, over which Nasir-ed-Din presided until 1271. He there constructed hydraulic and engineering machines and a variety of improved astronomical instruments, described by Delambre, and collected a fine scientific library.\n\nHe also wrote on Philosophy, combining Aristotle with Plato, and\nmade a Persian translation of the *Almagest* of Ptolemy. And he translated into Arabic the *Elements* of Euclid. He compiled a body of *Tables* of astronomical observations, taken over twelve years. They were dedicated to the Mogul Sultan, were known as the *Ilkhanic Tables*, and enjoyed a great reputation in the East. He also wrote on geography, determining longitudes and latitudes. [F. H.]\n\n\n**HIPPARCUS, abt. 150 B.C.**\n\nHipparcus was born at Nicaea in Bithynia, and from his astronomical observations it appears that he was living in the interval 180-125 B.C. His observations appear to have been almost entirely taken from the island of Rhodes. Whatever communication he had with Alexandria, there is no evidence that he resided there.\n\nOf the numerous astronomical memoirs which he is recorded to have written, the only one that is extant is his commentary on the poem of Aratus, recording the observations of Eudoxus. Hipparcus was probably young when he wrote this work: it does not mention any of the discoveries that have made him famous. Pliny, writing in the first century A.D., speaks of him with enthusiasm, as a man whom it was impossible to over-praise, and mentions specially his audacious enterprise of constructing a map of the stars. Ptolemy, in the following century, calls him a laborious searcher after truth, and makes continual references to his results. But in the great historical work of Delambre, it was for the first time shown in detail that Ptolemy had acknowledged but a small instalment of his debt; and that the immense reputation enjoyed by him through the times of Arabian and medieval astronomy rested in great part on the discoveries of Hipparcus.\n\nThese discoveries are numerous; but the two most important of them, the institution of Trigonometry and the establishment of the precession of the equinoxes, are, as Comte has pointed out, intimately connected with each other. He found, by comparing his own observations of the stars with those made 150 years previously by Aristillus and Timocharis, that their positions as measured perpendicular to the equator and parallel with a fixed point in it (i.e. their declinations and right ascensions), showed notable variation of an apparently irregular kind. The case altered, however, when the two positions of the star were referred not to the equator, but to the ecliptic. Measured perpendicularly to the ecliptic the position of the star—in other words, its latitude—had not changed; but the measurement parallel to the ecliptic, that is to say its longitude, showed a variation amounting to a degree and a half in the period examined. This remarkable phenomenon was geometrically represented by supposing the intersections of the equator with the ecliptic—in other words, the equinoctial points—to alter their positions yearly in a direction opposite to that of the sun's path. They were said to retrograde, so that the equinoxes occurred every year some-\nwhat earlier than would be the case if they remained stationary. The conversion of declinations and right ascensions into latitudes and longitudes shows that Hipparchus had the power of solving the spherical triangle produced by the intersections of the equator and the ecliptic with a meridian; in a word, that he was acquainted with the principles of spherical trigonometry.\n\nBut for the further discoveries of Hipparchus on the solar and lunar motions, plane, as well", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " own hair. Other similar figures at Archelaos I’s court included the poets Agathon, Choerilus of Samos, and Timotheus of Miletus, as well as the painter Zeuxis of Ephesus. Perhaps to these should be added the sculptor Callimachus, if the identification of an inscribed epigram found in Aegae as his funerary inscription is correct.\n\nThe circulation of intellectuals and artists throughout the Hellenic territory was a matter of course. In the sphere of political thought, during the 5th century the ties between many of them and democratic leaders were strong. However, after the death of Pericles there was a gradual shift towards other sorts of governments, a trend that continued at the beginning of the 4th century. The relationship between authoritative rulers and intellectuals became stronger; we know of many cases all over the Greek world, such as Plato in Syracuse. It is in this context in which Archelaos I should be framed. Antisthenes, one of the disciples of Socrates, was interested in the monarchy, and wrote a book, now lost, about the Macedonian king, as well as another about Cyrus. This should not be interpreted as a mere coincidence.\n\nThe aim of Archelaos I’s attempts to attract intellectuals and artists to his court was not just to expand his network of contacts or the mere celebration of symposia, but also to learn from them and to introduce reforms in his kingdom following their advice. That is why, for example, Euripides is supposed to have overseen the financial administration of the kingdom. Archelaos I’s reign coincided with a moment when places like Macedon might have been perceived as being safer than others such as Athens, where the ravages of war were becoming increasingly more conspicuous and where some intellectuals did not encounter an atmosphere conducive to the development of their ideas. At the same time the connections of the kings with the Greek community would improve their reputation.\n\nNot everybody accepted Archelaos I’s invitation to join his court, though. According to Aristotle, Socrates rejected such a proposal, arguing that it was disgraceful not to be in a position to return a favor, as well as an injury. In the same vein, the contemporary\n\n---\n\n48 D.S. 13.103.5; Paus. 1.2.2; Plu. De ex. 604d-e. In this connection, SCULLION 2003, 389-399 discusses a possible misinterpretation of the sources and holds that Euripides might have actually remained and died at Athens, but his arguments are not convincing. For this debate and previous bibliography, see LAMARI 2017, 46, who states that the strongest argument in favor of this theory is the reference to the presence of Euripides at Archelaos I’s court made by Aristotle, who had lived there when his father was a physician to King Amyntas III. STEWART 2021, 95-97 goes further and suggests that Euripides’ stay in Macedon should be divided into two periods, approximately from 412/411-410 and 408-406.\n\n49 Solin. 9.15.\n\n50 Ar. Ran. 83-5; Pl. Symp. 172c; Ael. VH 13.4. Although the presence of Agathon in Macedon is not certain; in this respect, see MULLER 2016, 175-181.\n\n51 ROISMAN 2010, 156-157; MOLONEY 2014, 603.\n\n52 Plin. HN 35.36.62.\n\n53 PASPALAS 2011, 185.\n\n\n57 LURAGHI 2013, 139-140. As PRINCE 2015, 162-163 suggests, the form of the title, Ἄρχελαος ἢ Περὶ βασιλείας, implies that this work was probably written as a dialogue between Archelaos I and, possibly, Socrates.\n\n\n59 Arist. Rhet. 1398a [25].\nsophist Thrasymachus called Archelaos I a barbarian in his speech in defense of the Larissaeans, who ran the risk of being enslaved by the monarch.\n\nThe conspiracy that supposedly ended with the death of Archelaos was hatched precisely in this circle of intellectual companions. The attack was orchestrated by Decamnichus, who was furious at the king for having handed him over to Euripides to be flogged after the young favorite had remarked on the playwright’s bad breath. The plotters also included the above-mentioned Crataeas, a resentful lover of the monarch and the one who killed him, as well as Hellanocrates for similar reasons. In both cases, Archelaos I had made them promises that he subsequently broke.\n\nAnother aspect that should be considered in the cultural field is the creation of agones. Dion, the main sacred site of Macedon, became the seat of the Olympia, a festival in honor of Zeus and the Muses. The existence of these agonistic competitions is attested in both the literary and epigraphic sources. The nature of the extant accounts of the Olympia makes it difficult to paint a detailed picture of the organization and sequence of the festival, and especially so to determine its real origin. It is Arrian who mentions Archelaos I as the founder, although in his account the historian refers to the agones of Alexander the Great at Aegae, before the expedition to Asia and immediately after performing sacrifices to Zeus Olympios. Assuming the reliability of Arrian’s account of this episode, since he had access to first-hand sources, this information can be interpreted as a reference to a special edition of the Olympia at Aegae, whereas the traditional one would have taken place at Dion. In fact, that Archelaos I did not found the agones, but may have instead reorganized them, should not be ruled out.\n\nArchelaos I is supposed to have been interested in Panhellenic games. According to Solinus, he obtained victories in the chariot races at the Pythian and Olympic Games. This account, albeit difficult to accept, is certainly in keeping with the king. Archelaos I may have chosen Dion for the Olympia due to its proximity to Mount Olympus, an iconic place for all Greeks. Although some scholars have considered this festival as a sort of counter-Olympics, it was more likely an attempt to forge stronger links with the southern neighbors, thus allowing for a more fluid communication, as well as to create a flagship festival for the Macedonians. There is no reason to believe that those\n\n---\n\n60 Thrasy. fr. 2 DK / D18 B2 Laks–Most: “δοιλεόσομεν Ἐλλήνες ὄντες βαρβάρους”.\n61 Arist. Pol. 1311b.\n62 Thuc. 1.126.5 (Scholia); D. 19.192; D.S. 17.16.3-4; Dio Chrys. 2.2; Arr. An. 1.11.1; Philostr. Ap. 1.34; Steph. Byz., Δiov; SEG XLVIII 781; IG IV 682, ll. 5-6; BE 1939, No. 139. Perhaps also Luc. Her. 7; IG VII 2486; IG XI 4, 1059; I. Sardis 79, ll. 11-15.\n63 The most thorough attempt to examine the origin, nature, and organization of this festival can be found in MARI 1998.\n64 Arr. An. 1.11.1.\n65 MARI 1998, 148-149.\n67 Solin. 9.16.\n68 BADIAN 1982, 35. This is connected with the debate on the participation of Alexander I in the Olympic Games (Hdt. 5.22). To put it succinctly, there is no evidence of the presence of the king. In fact, the passage in Herodotus should be read from a political perspective. For further information on this debate and a previous bibliography, see FEARN 2011, 116-118, esp. n. 34.\n69 ALBANIDIS 2009, 8. GRAZ 2016, 67 wonders whether Dion became the federal sanctuary of the Macedonians as a result of the introduction of the Olympia.\n70 BADIAN 1982, 35-36; BORZA 1993, 240-241, who initially supported the thesis, but then changed his mind.\n71 ALBANIDIS 2009, 9; MARI 1998, 164-165.\ngames could compete with the Great Games and, at the time, the Olympia may have been", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": "3 kilometres northwest of Mexico City. It is a municipio and the cabecera or main town of the municipalidad\n\n---\n\n1 Mexican MS. 1, six folios, 27.3 × 21.5 cm., amatl paper.\n2 Fols. 1r, 1v, 2v, 5r, 5v, and 6r.\n3 Memoria de la administración pública del estado de México (Toluca, 1893), p. 219. It lies at 19° 43' north latitude and 99° 14' west of Greenwich at an elevation of 2,450 metres above sea level. See Salvador Sánchez Colín, El Estado de México (Mexico, 1951), i. 90.\nof the same name surrounding it. Tepotzotlán depends in turn upon Cuautitlán, administrative centre of the district in which it is located. In the late nineteenth century Tepotzotlán had a population of only 1,127 and the municipalidad had a population of 5,351. The main occupation of the inhabitants of both the municipio and the municipalidad is agriculture. The climate is that of the Central Valley of Mexico, temperate with a rainy season in the summer months.\n\nThe only attraction of Tepotzotlán to the traveller in Mexico today is the magnificent church and buildings of the Jesuit Seminary dominating the main plaza of the town. These buildings are high points in the late baroque style of Mexican Colonial architecture.\n\nThe main native language of the inhabitants was probably Otomi, although Náhuatl was also spoken. In the Pre-Conquest Period Náhuatl was the lingua franca of the Aztec domains, not only for purposes of administrating the Empire but also as a vehicle of communication among peoples who did not speak a common native tongue. It was also used frequently for place names of pueblos that did not speak the language. Thus Tepotzotlán comes from the Náhuatl Tepotzo-, hunchback, and -tlan, place of. Mr. McAfee translates this as “Hunchbaxton” in our Appendix, taking advantage of the ease with which Náhuatl place names can be anglicized.\n\nDuring the Colonial Period Spanish usurped the role of Náhuatl as lingua franca, but still the viceregal courts recognized Náhuatl as the most important Indian language in most of Mexico and the court used an interpreter, called a nahuatlato, when necessary. In some cases, Indians who did not speak Náhuatl\n\n---\n\n1 *Memoria*, pp. 55-6. In the census of 1940 it had 1,378, the municipalidad 7,879 (Sánchez Collín, chart between pp. 120-1). In 1950 the municipalidad had risen to 10,703 (loc. cit. chart between pp. 136-7).\n\n2 There is a fine monograph on the Jesuit buildings at Tepotzotlán which also includes a brief history of the town. See Pablo C. de Gante, *Tepotzotlán, su historia y sus tesoros artísticos* (Mexico, 1958).\n\n3 Ibid. pp. 23 ff., esp. p. 39. See also Mariano Cuevas, *Historia de la iglesia en México* (Mexico, 1946), ii. 375, where he mentions Mazahua as well as Otomí being taught at the Seminary of Tepotzotlán, quoting from Avellaneda, a Jesuit writing in 1592.\n\n4 The English translation would thus be “Place of the Hunchback”.\n\nTECHIALOYAN CODEX OF TEPOTZOTLÁN\n\nwould have to use two interpreters, the first from their own lan\nguage into Náhuatl, and then the nahuatlato translated into\nSpanish. Thus the fact that Otomí was the important language\nof Tepotzotlán but the codex from Tepotzotlán was written in\nNáhuatl is not a disturbing factor. Since the manuscript is\nclearly a legal document, Náhuatl was a more effective vehicle\nthan Otomí would have been.\n\nTHE TEXT\n\nThe text of the Rylands manuscript is very specific.1 The\ndate May 10, [1]534 appears on the first page (fol. 1vir), and then\nthe scribe lists the name of the official drawing up the document\nand cites the Viceroy Mendoza as a witness (fol. 1v). The\npurpose of the document was to preserve for posterity the layout\nof the town, and it was realized in the town hall at a meeting of\nthe townspeople (fol. 2v). The boundary of the town is traced\npoint by point the way a surveyor might record it (fols. 3r and\n3v). An all too brief resumé of Pre-Hispanic history follows,\nlisting the name of the first ruler Cuauhtochzin (fol. 4r). A formal\nstatement says this town charter is meant to be binding forever\nin the name of the king (of Spain) (fols. 4v-5v). The last pages\nhave the signatures of those drawing up the document (fols.\n5v and 6r).\n\nInteresting for the historian is the name of the founder of the\ndynasty ruling Tepotzotlán and the fact that this account shows\nthe ruler in the early sixteenth century to have had the same family\nname although he has added to it a suitable Spanish and Christian\nname; he is now Don Bartolomé de la Cruz Cuauhtochzin,\ni.e. Sir Bartholomew-of-the-Cross Eagle Heart.\n\nTHE TECHIALOYAN CODICES\n\nThe Rylands manuscript belongs to a group of Mexican\nColonial manuscripts called the Techialoyan Codices. They are\nso close in many ways that one can postulate their all having\nbeen made by the same scribe and artist or at least by ones\nworking so much in the same tradition as to constitute a single\n\n1 See Appendix for transcription and translation prepared by Mr. Byron\nMcAfee of Mexico City.\nschool. This relationship between the artists of the Techialoyan codices was first noticed by Gómez de Orozco in an article publishing several of them for the first time and pointing out their similarities.¹ The late Robert Barlow continued the work of Gómez de Orozco and began cataloguing them, using a different letter of the alphabet for each successive codex he added to the group, calling them all The Techialoyan Codices. He named the group after the Codex of San Antonio Techialoyan to which he gave the letter “ A ”.² In a later article Gómez de Orozco continued the Barlow catalogue, adding others that Barlow had not published. The latest addition that this author knows is “ W ”, given to one in the catalogue of the Parke-Bernet auction house in New York.³ Alcina Franch and Carrera Stampa have published only parts of the catalogue. Neither has made original contributions over and above the second Gómez de Orozco article.⁴ In my recently published study of Mexican manuscript painting, I devoted a chapter to their artistic style alone.⁵\n\nThe first publication of a Techialoyan text was the Codex of San Antonio Techialoyan by Chimalpopoca, and the first publication reproducing the pictorial content of a Techialoyan codex was the Codex of Zempoala by Quaritch, the London book\n\n⁵ Donald Robertson, Mexican Manuscript Painting of the Early Colonial Period: The Metropolitan Schools (Yale Historical Publications : History of Art 12, New Haven, 1959), pp. 190-5, 197. Chapter 11, “ The Techialoyan Codices ”, is a study of the artistic style and not of the text, so the Rylands manuscript was only mentioned in passing, p. 190.\ndealer.¹ The first mention of them in the literature is in the eighteenth-century Boturini catalogue.²\n\nBoturini was a collector of manuscripts and books on the history of Mexico.³ He formed his collection because of his interest in the Virgin of Guadalupe, whom he wished to have crowned. His collection was that of an historian seeking to establish the historicity of the miraculous apparition of the Virgin on the Hill of Tepeyac, north of Mexico City. Boturini solicited and acquired money and jewels to effect the coronation but ran foul of the Viceroy Fuenclara defending the rights of the Spanish crown over religious affairs in the colony. As a result of the Viceroy's orders, he was imprisoned and his collection sequestered. It has been catalogued many times, he himself publishing the first catalogue in 1746.⁴ The subsequent vicissitudes of this collection do not concern us except that part of it was bought in Mexico in the nineteenth century and passed to France as the Aubin collection. Ultimately most of the Aubin material came to the Bibliothèque Nationale as the Goupil", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " object of noting these things had been to gain insight into the will of the gods, which they were supposed to indicate. Other facts of nature were studied just so far as they threw light on the practical arts of life: agriculture, weaving, dyeing, metal-working.\n\nBut now, from the seventh to the fifth century before the Christian era, arose men like Thales, Anaximander, Heraclitus, Democritus, who devoted their lives to the task of making the universe intelligible to man. Apart from all thoughts of religious belief on the one hand, or on the other of practical utility, they sought to arrive at some underlying principles to which the infinite variety of sights, sounds, and feelings that surround and make up man’s life could be reduced. The result of the work of these men, and of their colleagues and disciples, was the introduction of two new forces into the life and development of Humanity—Science and Philosophy.\n\nBy Science is meant the discovery of a general fact common to a great number of special facts: such as to enable us to foresee and measure things which we cannot directly handle. For instance, the number of triangles of different shapes that can be formed is infinite. Amidst these differences, Thales found one fact common to all: namely, that the three angles were in every case equal to two right angles. We are thus enabled to measure the sum of the angles of any triangle, or, if we know the sum of two of them, to predict the precise magnitude of the third, without direct measurement of the special case. Similarly, the biologist, examining the teeth and limbs of a new quadruped, is able to predict many facts as to its digestive organs and its moral nature; because he is in possession of a scientific law, that is, of a fixed general relation, connecting these facts together.\n\nPhilosophy, on the other hand, implies the attempt to find a principle, or series of principles, which may make man’s place in the world intelligible to him. In accordance with Comte’s law of the three stages through which our conceptions pass, these general principles will be first\nANCIENT PHILOSOPHY\n\ntheological, secondly metaphysical, and finally positive. That is to say, they will first explain the universe by the Will of a Being, or Beings, with passions and faculties akin to those of Man, but transcending them in power; secondly, by the artifice of some abstract entity, like Nature; and, lastly, the attempt to reach any absolute explanation of the universe will be abandoned, and Philosophy will consist in the orderly arrangement of scientific laws, in accordance with their closer or more distant bearing on the life of Humanity.\n\nComte's second law of evolution explains that our speculations pass through the first and second of these stages into the third, with varying rapidities, according as they relate to simpler and more general facts, or to those that are more special and complex. The branches of inquiry in which the thinkers of Greece reached the positive stage, related, with one important exception, to the simplest and most universal of all phenomena, those of number and space. In dealing with facts of a slightly higher degree of complication, those of motion, for instance, they were dominated by such metaphysical conceptions as that circular motion was perfect and eternal. With the facts relating to the composition of matter, to life, and to human conduct, the influence of similar metaphysical beliefs was even greater. The one remarkable exception is Aristotle, whose precocious genius introduced positive methods of research into these higher studies. Consequently his philosophy, though in the main still metaphysical, made advances in the direction of Positivism unapproached by any thinker of antiquity, and by few of modern times.\n\nThe history of Greek thought falls broadly into two periods. In the first, from Thales to Aristotle, positive science and metaphysical philosophy were, in the main, prosecuted by the same inquirers. In the second period, lasting till the suppression of the Hellenic movement by the Christian Church, Philosophy and Science parted company. Positive thinkers, from Archimedes to Hipparchus, devoted themselves to the special subjects of Geometry and Astronomy, in which alone the discovery of precise scientific laws was at that time possible. Philosophy, meanwhile, deprived of the bracing influence which positive thought exercised, even on subjects which it could not master, became intellectually more feeble and verbose; and the later stages of it would have deserved no record but that they served the social purpose of undermining polytheistic belief, and of preparing the doctrine on which the Catholic Church was ultimately to be founded.\n\nThe one really new thing given by Greece to the world is abstract science; that is to say, the isolation of a special class of phenomena as seen in various objects, and the discovery in these of fixed relations. Concrete science, founded on observations of objects, without any attempt to consider the distinct classes of facts, or phenomena, that each object presents, had of course existed from the earliest days of human society. Much positive knowledge of winds, tides, plants, and animals is possessed by savages. The philosophers and priests of China and Egypt had observed the apparent motions of the sun and planets, and the regular recurrence of eclipses. Geometry, Herodotus tells us, is of Egyptian origin; it was the art, as the name indicates, of remeasuring fields after the annual inundation of the Nile. But, between practical\nmensuration and what we understand by Geometry, there is an all-\nimportant difference. To measure a given surface with accuracy sufficient\nfor practical purposes is one thing; to abstract the line from the surface,\nand find out the fixed relations between lines bounding every kind of\nsurface, is quite another. And it is this that was done by the long line\nof Greek scientific thinkers from Thales to Hipparchus. It was the first\napproach to the scientific conception of the universal order, which is, at\nthe present time, working so fundamental a change in human society.\n\nSome glimpse of its social import was visible at the outset. In the\nbest period of Greek thought, lofty views as to the conduct of life were\ncombined with scientific speculation. \"Study Geometry before you\nenter here,\" was the inscription over the school of Plato. Still more\nfully was the bearing of science upon human conduct recognised by\nPythagoras, whose noble, but premature, attempt to organise life on the\nbasis of scientific law failed only because the range of science was limited\nas yet to the facts of space and number. It was left for Aristotle to\nintroduce the conception of scientific order into the more complicated\nfacts of life and society.\n\nThe names given in each week of the month of Aristotle are arranged\non the following plan:\n\nThe first week represents the dawn of Greek thought, in which\nattempts were made to explain the universe by some one physical\nprinciple; the positive science of geometry meanwhile slowly disengag-\ning itself. Of this stage, Thales is the principal representative.\n\nThe second week illustrates the premature, but momentous, effort to\nuse science as the basis for the organisation of human life, instituted by\nPythagoras.\n\nThe third week presents the ethical side of Greek thought. This was\nthe side most attractive to Roman thinkers, three of whom are here\nincluded. The principal type is Socrates.\n\nThe final week is devoted to the school which, under the teaching of\nPlato, prepared the way, consciously or unconsciously, for the Christian\nChurch.\n\n[J. H. B.]\nARISTOTLE, b. 384 B.C., d. 322 B.C.\n\nARISTOTELIS, son of Nicomachus, physician at the court of Macedon, was born 384 B.C., in Stageira, on the coast of Thrace. At the age of eighteen, or, by another account, at the age of thirty, and after much experience of practical life, he came to Athens, and entered the school of Plato. After Plato's death, in 347, he lived at Atarneus, then ruled by Hermias, whose niece, Pythias, he married. After the death of Hermias, he lived for some years at the court of Philip of Macedon, where he was charged with the education of Alexander till the death of Philip, in 336. He was much occupied during this period with civic duties of great importance in his native city of Stageira. When the Persian war began, Aristotle went again to Athens, this time not as a pupil but as a master, and established his school in the gymnasion attached to the temple of Lycean Apollo. At the death of Alexander, twelve years afterwards, a charge of impiety was brought against him by the chief-priest of Demeter. He retired from Athens, and died the next year at Chalcis, at the probable age of sixty-two years. His will is preserved to us in the biographies of Diogenes Laertius; it shows affectionate thought for each member of his family, and grateful remembrance of those who had died before him. His household servants are not forgotten; they are to be set free from bondage.\n\nIt has been often said that Aristotle's greatness was not recognised till the Middle Ages. And this is true; but it does not go far enough. The Greek world, now politically degenerated, looked on Plato, and men far weaker than Plato, as his superiors. By a strange accident, his principal works, intrusted to his disciple Theophrastus, disappeared from view for two centuries, till brought to Rome by Sulla, and edited by Andronicus. In the turmoil of barbarian invasion, and during the building up of the Catholic Church, his name was forgotten, except by a few obscure writers in Constantinople, till the great Mohammedan schools arose in Baghdad and Cord", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": " Ross’ Landing, Bybee Ferry, the Hair Condab Cabin, and the Fort Royal Historic District; nominations for Fort Hill Cemetery, Elkton Turnpike, Rock River Road and Crossing, Higgins Farm Trail Trane, and Rock Martin House.\n\nThe NPS has also entered into a cost-share agreement with the University of North Carolina to assess for National Register eligibility the Stigui House site, the Valleytowns Baptist Mission, the John Christie House and Cabin site, the Old State road, Pile Ridge Road, Burnt Stand, the Unicoi Turnpike, and Fort Butler.\n\nFor more information contact Aaron Mahr at the National Trails Office-Santa Fe.<|endoftext|>How Can We Make Digital History Sites Personal?\n\nJacob Dinkelaker\nNational Park Service\n\nFollow this and additional works at: https://cupola.gettysburg.edu/interpretcw\n\nPart of the Cultural History Commons, Public History Commons, Social History Commons, and the United States History Commons\n\nShare feedback about the accessibility of this item.\n\nDinkelaker, Jacob, \"How Can We Make Digital History Sites Personal?” (2011). Interpreting the Civil War: Connecting the Civil War to the American Public. 185.\nhttps://cupola.gettysburg.edu/interpretcw/185\n\nThis open access blog post is brought to you by The Cupola: Scholarship at Gettysburg College. It has been accepted for inclusion by an authorized administrator of The Cupola. For more information, please contact cupola@gettysburg.edu.\nHow Can We Make Digital History Sites Personal?\n\nAbstract\nIt's a question I've been asking myself a lot recently. Digital public history sites are springing up all over the web. There are snazzy ones with great content like The Antebellum Project, which showcases Bowdoin College's role in the coming of the Civil War. There are information and resource dumps like Ancestry.com that allow its users to see tons of different historical sources. There sites that use GIS like WhatWasThere and allow users to collectively document the world around them. Then there are websites that are digital exhibits built to accompany an actual physical exhibit - one of my favorite examples is this one by the Met on paintings that feature scenes from everyday life in America. [excerpt]\n\nKeywords\nCW150, Gettysburg, Gettysburg College, Civil War Era Studies, Civil War Interpretation, Interp Theory, Digital History\n\nDisciplines\nCultural History | History | Public History | Social History | United States History\n\nComments\nInterpreting the Civil War: Connecting the Civil War to the American Public is written by alum and adjunct professor, John Rudy. Each post is his own opinions, musings, discussions, and questions about the Civil War era, public history, historical interpretation, and the future of history. In his own words, it is \"a blog talking about how we talk about a war where over 600,000 died, 4 million were freed and a nation forever changed. Meditating on interpretation, both theory and practice, at no charge to you.\"\n\nCreative Commons License\nCreative\nThis work is licensed under a Creative Commons Attribution-Noncommercial 4.0 License\n\nThis blog post is available at The Cupola: Scholarship at Gettysburg College: https://cupola.gettysburg.edu/interpretcw/185\nHow can we make Digital History Sites Personal?\n\nOr, are they already personal?\n\nIt’s a question I’ve been asking myself a lot recently. Digital public history sites are springing up all over the web. There are snazzy ones with great content like The Antebellum Project, which showcases Bowdoin College’s role in the coming of the Civil War. There are information and resource dumps like Ancestry.com that allow its users to see tons of different historical sources. There sites that use GIS like WhatWasThere and allow users to collectively document the world around them. Then there are websites that are digital exhibits built to accompany an actual physical exhibit - one of my favorite examples is this one by the Met on paintings that feature scenes from everyday life in America.\n\nEach one of these websites presents a great learning opportunity. But...does each one of these websites present a similar ability for its users to find meaningful connections with historic ideas, objects, artifacts, events, and people? It seems that so much of interpretation at museums and historic sites relies on experience. You can see the artifacts in the museum and image the hands that made the uniform, or the persons who drank out of that cup and canteen. To use my favorite example, by visiting battlefields, you not only see the ground over which Pickett’s Charge occurred, but also the farmhouse of the free African-American family who owned just a few of the fields that the Confederates charged over and died upon.\n\nCan you have the same experience online? Does watching a video or uploading a picture create the same opportunities as talking to an interpreter? On one hand, it’s probably good news that a video can never replace an actual human being. But what then of digital public history? Does the sense of ‘discovering’ history on your own, in your own home, and at your own pace make up for this lack of experience?\n\nI think it does (or at least it does it for me). Digital history sites democratize history. They allow anyone with an internet connection to experience the thrill of research, the telling of a great story, or connecting with a physical site, even though it’s through a computer screen and keyboard. Is that, in of itself, personal interpretation? I don’t know yet. Let me know what you think in the comments.\n\nYep, I know - short post this week, but I’m moving! By the end of the month I’ll be settled into my new apartment in Washington D.C. - the capitol of public history. As such, expect to hear my adventures and critiques of public history sites in the area. Before hitting up Washington D.C. I have some unfinished business with Gettysburg next week as I get back to the Civil War here on the blog...<|endoftext|>CONTENTS\n\n\nThe Early History of the Communist Party of Great Britain. By Henry Pelling, M.A., Ph.D. 41\n\n\nThe Protestant Constitution and its Supporters, 1800–1829. By G. F. A. Best, Ph.D. 105\n\nThe New Agriculture in Lower Normandy, 1750–1789. By Alun Davies, M.A. 129\n\n\nReport of Council, Session 1956–57 167\n\nAlexander Prize 177\n\nDavid Berry Prize 179\n\nOfficers and Council, 1957 180\n\nList of Publications i<|endoftext|>Colonel Samuel Bagshawe And The Army Of George II, 1731-1762\n\nSamuel Bagshawe; Alan J Guy; Army Records Society (Great Britain)<|endoftext|>CULTURAL HERITAGE\nand\nLAND MANAGEMENT PLAN\nfor the\nBLACKSTONE RIVER VALLEY NATIONAL HERITAGE CORRIDOR\nCULTURAL HERITAGE\nand\nLAND MANAGEMENT PLAN\nfor the\nBLACKSTONE\nRIVER\nVALLEY\nNATIONAL\nHERITAGE\nCORRIDOR\n\nAs approved by Blackstone River Valley National Heritage Corridor Commission / October 21, 1989\n\nSUBMITTED FOR REVIEW AND APPROVAL TO\nThe Governor, Commonwealth of Massachusetts\nThe Governor, State of Rhode Island and Providence Plantations\nThe Secretary of the Interior\n\"The hardest working river, the most thoroughly harnessed to the mill wheels of labor in the United States, probably in the world, is the Blackstone.\" Winthrop Packard, writing in the October 1909 edition of the Technical World magazine, proclaimed the dramatic industrialization of the Blackstone River Valley. Packard's proclamation was made a little more than a century after the American Industrial Revolution was born along this same Blackstone River at Samuel Slater's mill in Pawtucket, Rhode Island.\n\nIn the eighty-years since that startling claim was published, the Blackstone Valley has experienced a transformation that mirrors much of the economic history of the United States. The industries which caused the Valley's countless brick mills to shudder continuously throughout the 19th century fell quiet as this century progressed. A region that once, like Ellis Island, whose buildings were constructed with Blackstone Valley granite, welcomed masses of immigrant workers later had fewer and fewer jobs for their children. A long period of depression consumed not only money and industry, but the confidence and self-esteem of the people who lived in the towns, mill villages, and cities along the Blackstone River and its tributaries.\n\nParadoxically, the neglect which cast long dreary shadows over the Blackstone Valley also allowed the Valley's special character to survive. We can still see the outline of the 19th century industrial society in the mill villages, the farms and market towns, the roads, rails and canal, the cities, the ethnic neighborhoods, and the magnificent mills. Much of the very best of our past is still here. As development returns, we have the chance to avoid the tragic development mistakes made by others.\n\nWe have much to treasure from our past. The Blackstone River Valley once typified the explosion of American entrepreneurial creativity and confidence. The Valley's story is one of work in America. It reflects the interdependence of engineering and nature, and of labor and management. It is also a story of independence of thinking and of religion, the story of a region that resisted the dictates of a distant theocracy and oligarchy in Puritan Boston.\n\nAfter decades of neglect, growth and change have arrived in the Blackstone River Valley. In recent years, we've witnessed the initial impact of what has irrevocably changed much of America. Economic", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": "/articles/RR/mzr1_print.html](http://www.tshaonline.org/handbook/online/articles/RR/mzr1_print.html).\n\n33. [www.tshaonline.org/handbook/online/articles/RR/mzr1_print.html](http://www.tshaonline.org/handbook/online/articles/RR/mzr1_print.html).\n\n34. Berwanger 8.\n\n35. There were 1,034 organized churches in Texas in 1860.\n\n36. 1870 United States Census Table XVII (A) and (B).\n\n\n38. *Handbook of Texas Online - Bowie County*. \n\n39<|endoftext|>Romans Workpack\nKey Stage Two\n\nMuseum of Classical Archaeology\n\nWritten and Compiled by Justyna Ladosz\nImages Copyright: Museum of Classical Archaeology\nWith Illustrations by Katie Idle\n1. Your first task is to find the first Roman to invade Britain. He has a very stern looking face, and a famously prominent strong nose. Write down his name:\n\nThink of two adjectives that describe this portrait and write them down:\n\n2. Stay in Bay J and find the head of Emperor Claudius. Hint: it is small, bronze, and has a ragged edge.\n\nWhich parts of his face are similar to the portrait of Julius Caesar you just saw?\n\nEyes Ears Nose Eyebrows\n\nThis head was found in a river in Suffolk. The ragged edge means the head was violently cut or snapped from the rest of the statue. What might have happened?\n\n3. Go back to the head of Julius Caesar. Look to the left and find the emperor who towers above all others and has a beard. What is his name? Britain has a very big thing named after him, what is it?\n\nOn the next page try to draw this emperor. Pay attention to his beard, full head of hair and armour.\nHungry for more?\n\n4. Match the emperor and their British connection\nJulius Caesar Boudicca revolted against him\nClaudius Emperor of the famous wall\nHadrian First to Conquer Britain\nNero The first Roman general to invade Britain.\n\n5. Which of our emperors in Bay J has the best hair? Write down your answer:\n1. Go to BAY J, and find the mother of emperor Claudius. Her name is ANTONIA MINOR and her head is VERY BIG.\n\nCan you see and draw:\n- the beaded band at the top of her head\n- the diadem decorated with leaves\n- curly locks on either side of her neck\n\nCircle the correct answer: Her accessories are...\n- everyday dress In Roman times\n- a special style showing she was the mother of an emperor\n- a special style she wore because she was a priestess\n\nLook at the statues around you. The head of ANTONIA (which was part of a whole statute) is COLOSSAL in comparison to them. Why could that be? Discuss with your friends and write down two possibilities:\n\n2. Go. To BAY J and find three busts of women next to each other. Two of the women belonged to the imperial family. Can you find out their names and write them down?\n\nEach of the women has a very different hairstyle, showing you how fashion changed in Rome. Pick your favourite one and try describing it to someone who hasn't seen the statue!\n\nHow many different women's hairstyles can you find in Bay J? Count them and write down your answer.\nImperial Women\n\nDrawing Space\n\nmuseum of classical archaeology 2020\n1. Go to BAY K and find a massive statue of a young man with grapes in his hair. What does Antinous have in common with the god of wine Dionysos in this portrait?\n\n2. Stay in Bay K and turn around. Can you find a large round objects with figures on it? This is a well head!\n\n Can you find these gods and goddesses on the well head? Look for the objects the gods are holding or wearing to help you!\n\n - Vulcan, the god of blacksmiths is holding a ....................................................\n - Mars, the god of war has ..................................................................................\n - Minerva, the goddess of wisdom has............................................................... \n - Diana, the hunter goddess is holding a ...........................................................\n\n3. Find a statue of Diana, the hunter goddess in Bay E.\nGods and Emperors\n\nDraw one of the gods and goddesses or create your own Roman God.\n\nHungry for more?\n\nGo to BAY J\nFind a man in armour, his name is Augustus, he was the first emperor. What is he wearing? (Hint: this is what most general would wear at the time).\n\nCount all the gods and humans depicted on his armour:\n\nCan you find the baby next to his feet?\n1. Go to BAY K and find the creature with snake legs. Who is he? What is happening?\n\n2. Turn to the right, find a bronze deer. He was found in a villa in Herculaneum. What happened to Herculaneum? Read the label to find out and write down your answer:\n\n3. Go to BAY J and find the man wrangling with snakes. This is what happened to people in Roman myth if they annoyed the gods. How many snake heads can you see? Describe the emotions of the man and his sons in two words:\n\n4. In Bay H are two boys playing with animals. Can you find:\n A boy with a small goose\n A boy with a bigger goose\n\n5. Go to Bay F and find a hunter. What animals are next to him?\n\nWrite down all the animals you have found in the museum:\nAnimals and Monsters\n\nDrawing Space\n\nMuseum of Classical Archaeology 2020\n1. Go to BAY J and find a boxer resting after a fight. Can you see:\n - Boxing gloves\n - Swollen ear\n - Swollen nose\n\n2. Stay in BAY J. Turn around and find a small bronze statuette next to the emperors. He was found in the house of the Faun in Pompeii. What is a faun? Which two things show us he is not human?\n\n Tail Feet Ears Hair\n\n What is the faun doing?\n\n3. Find the statue of Hercules in BAY K. It stood in the public baths in Ancient Rome. What did Romans do at the baths?\n\n - clean themselves - chat to their friends - conduct business\n\n Which town in Britain takes its name from this Roman habit?\n\n4. Stay with Hercules. Can you spot:\n - His cape of lion skin\n - His weapon - a club\n - The apples of Hesperides\nGames and Villas\nDrawing Space<|endoftext|>Visual Culture in Prehistoric South-east Italy\n\nBy Robin Skeates\n\nUsing the approach of visual culture, which highlights the embeddedness of art in dynamic human processes, this paper examines the prehistoric archaeology of the Lecce province in south-east Italy, in order to provide a history of successive visual cultures in that area, between the Middle Palaeolithic and the Bronze Age. It is argued that art may have helped human groups to deal with problems in subsistence and society, including environmental changes affecting the cultural landscape and its resources, the breaking up of old social relations and the establishment and maintenance of new ones. More specifically, art appears to have become increasingly related to the expression of religious and even mythical beliefs, and in particular to the performance of ceremonies and rituals in selected spaces such as caves. This may reflect the existence of a long-term tradition of performance art in prehistory, involving performers and viewers, in which art helped to structure and heighten the sensual and social impact of the acting human body.\n\nTOWARDS AN ARCHAEOLOGY OF VISUAL CULTURE\n\nThe main aim of this paper is to promote archaeological interest in the study and approach of 'visual culture', with its emphasis on the social dynamics of visual communication. This is an area closely related to the study of 'art', which can be broadly defined as those made objects that are intended to be visually expressive and stimulating. The term 'visual culture', which has recently gained widespread (although not total) interdisciplinary acceptance, usefully complements and broadens this definition with the belief that such objects also comprise an integral part of the mental and cultural processes through which people construct themselves (see, for example: Alpers et al. 1996; Walker & Chaplin 1997; Rogoff 1998; Mirzoeff 1999). In doing so, 'visual culture' highlights not only the manufactured ('artefactual') nature of art, but also its embeddedness in dynamic human processes.\n\nThis approach deserves to be better-known by archaeologists. On the one hand, it has the potential to enhance traditional archaeological approaches to the history of art, including the study of prehistoric art in terms of its technical production, style, iconography, siting, spatial distribution, relative age, archaeological culture, and evolution (eg. Graziosi 1973). On the other hand, it is clear that visual culture studies share much in common with contemporary 'contextual' and 'interpretative' archaeological approaches to the symbolic and structural meanings of material culture (eg. Hodder 1982; 1986, 118–46; Thomas 1993; Tilley 1998). The almost unbounded range of manufactured material studied by these contemporary approaches is comparable. Together, they emphasise the centrality and embeddedness of the material and the visual in cultural processes, within which art objects are seen to participate actively in the production, reproduction, and transformation of social values, meanings, and relations.", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-history_and_geography", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-history_and_geography/part-00-00000.npy", "text": ".), F. 18, stamp Tasc (Tascilli, Lezoux Domitian-Hadrian). Coarse Ware. This was not studied at the time of excavation but preserved in Aldeburgh Museum and consists of fragments of jars with cordons and incised decoration imitating Gallo-Belgic forms. V.C.H. 307-B.\n\n\nHolbrook. Greenwich Royal Hospital. When excavating for swimming bath in 1929 the mechanical grab brought up fragments of coarse pottery, small jug, terra sigillata F.18 (135-200 A.D.), two coins unidentified, from depth of 6-8 ft. Pottery at and information from Greenwich Royal Hospital Estate Office, Holbrook. Pottery examined by Mr. M. R. Hull.\n\n\nIworth (Including Pakenham) Priory Farm. Fragments terra sigillata and coarse ware dishes, cordoned bowls and jars. Fragment decorated terra sigillata Vespasian-Domitian, South Gaul. Duck Farm (Pakenham). Fragments terra sigillata, fragment F.36 Antonine. Coarse ware as above. (Notes made when inspecting pottery in the possession of Major G. Kilner). Other Pottery. Decorated terra sigillata bowl F.37 (Antonine). Ash.M. R. 294. Coarse ware:—grey bowl with cordons from Pickerel Inn. (Fig. 2, XI). Ash.M. 1907. R 215. Small grey bowl with everted lip and cordon around girth (Fig. 2, XIII) from Pakenham. Ash.M. Also dark grey beaker with everted lip on shoulder, polished zone on shoulder and at base with incised vertical lines in groups between (Fig. 2, IV) Ash. M. R.212. All three similar fabric to Wattisfield kilns.\n\n\nLakenheath. At foot of Maid's Cross Hill, close to meeting place of chalk and fen. Many Roman objects obtained from this site including coins, Philippus-Honorius. About 200 yds. from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted. Terra sigillata:—sherd from this site remains discovered in 1945. Patches of black sand noted.\n\n\nCOIN HOARDS.\n\n\nFrom the study of the distribution of these sites and the characteristics of the pottery upon which the classification has been based much light is thrown upon what took place in the county in the years that follow Boudicca’s revolt.\n\nDISTRIBUTION\n\nThe Roman sites at Capel St. Mary, Coddenham, Darmsden, Hazlewood, Lattingford and Reydon Smere, and the finds of pottery at Combs, Ipswich and Kirton, in East Suffolk, together with the site at Long Melford in the Stour Valley and the pottery from Exning, demonstrate that the occupation of the areas commenced in Prasutagan times was continued. That new areas were also occupied now is shown by the finds at Great Welnetham, Hitcham, Ixworth and the Wattsfield district. It will be noted that the river valleys are still preferred and the clay lands\navoided. The absence of any considerable finds in Breckland, apart from the kilns at West Stow and the pottery from Lakenheath, is puzzling. It may be that the archaeological record is at fault. Perhaps the nucleus of the Icenic kingdom was slower to recover from the destruction of Suetonius Paulinus than the outlying areas.\n\nCHARACTER OF THE OCCUPATION\n\nThe classification of these sites upon the basis of the pottery produced has already been mentioned. Since much of this is salvage material and in some instances consists of fragments only it would be hazardous to place much reliance upon it ifit did not display features that have been noted in that from the more systematically excavated sites in Norfolk (Caistor-by-Norwich, Gayton Thorpe, Needham, Scole and Runcton Holme) and Wattisfield. Prof. Atkinson noted both at Gayton Thorpe and Caistor-by-Norwich that backwardness seemed to be an East Anglian characteristic and observed a \"lagging tendency\" in the coarse ware, types not to be expected after 120 A.D. appearing with terra sigillata of the Antonine Age. Prof. C. F. C. Hawkes found that the Runcton Holme pottery confirmed Prof. Atkinson's conclusions and remarked upon the influence of Gallo-Belgic forms upon the work of local potters and the absence of pieces common in the Flavian period. The pottery from Needham, Scole and Wattisfield displayed the same features. The coarse ware available for study from Darmsden, Exning, Hazlewood, Hitcham, Ixworth, Kirton, Lakenheath, Lattingford, Long Melford and Reydon Smere is of a piece with that from the Norfolk sites and Wattisfield.\n\nThe hypothesis put forward by Prof. C. F. C. Hawkes to account for the backwardness of the pottery from the Norfolk sites may now with good reason be applied to that from Suffolk. Prof. Hawkes holds that \"provincial civilization seems to have made but little headway among the Iceni until the second century had well begun\" and accounts for this by the ruthless treatment that was meted out to the Iceni after the revolt of Boudicca. We may therefore conclude that the \"revival\" of the Roman life in Suffolk cannot have commenced much before the end of the first century and did not flourish to any appreciable extent till well on into the second century.\n\nThough buildings have been noted at Capel St. Mary, Coddenham, Hitcham, Lattingford and Reydon Smere not enough is known about them to make their history clear. That they had their beginnings in the second century is certain, and it is almost equally certain that they were not occupied later than the first decade of the third century. It is probable, however, that they were deserted at an even earlier date. Since there was a more extensive occupation of our county in the third and fourth centuries the discussion of the demise of these buildings will be deferred to the latter part of this account when the evidence of the occupation for these centuries has been presented.\n\nIn 1843-4 four Roman barrows, within 250 yards of remains of buildings, were investigated at Rougham. The second contained among other objects terra sigillata belonging to the first half of the second century; a fourth at Eastlow Hill contained a small chamber in which was found a leaden coffin with a skeleton within. Other Roman barrows in Suffolk have been noted at Blaxhall and Stonham. The Rougham barrows were interpreted by Sir Cyril Fox as a survival of a La Tène custom in our area, while the absence of grave furniture in the fourth at Eastlow Hill he held to indicate a \"Christian burial\" probably of the fourth century. Messrs. Dunning and Jessop in a more extended survey of Roman barrows concluded that no barrow was built later than the second century though Eastlow Hill was regarded as a possible exception. On the ground that outside Britain Roman barrows are found to be concentrated in Eastern Belgium, these writers reached the conclusion that the custom was introduced into Britain by merchants from Rhineland who participated in its commercial development.\n\n**COMMUNICATIONS**\n\nIt has already been noted that no road", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " from the mountains of Asia Minor. It grows from four to eight inches high, and in early spring is covered with spikes of the most beautiful sky-blue, white-centred flowers. Winter aconite (*Eranthis hyemalis*), also bears beautiful bright-yellow flowers in early spring. But the earliest of all these early bulbs is the snowdrop, *Galanthus nivalis* and *G. Elwesii*, bearing large bell-shaped white flowers, which often peep out in January. All these very early-blooming bulbs are specially attractive planted in the greensward, where their charms are relieved by the first green of spring. Yet the border in the flower garden is the most congenial after all, the place where the best flowers bloom.\n\nMany of the irises are beautiful, but there are none more delicately and daintily beautiful than the bulbous and tuberous-rooted species. Chief among these are the golden-netted irises (*Iris reticulata*). The flowers are deep violet-blue, netted with fine golden-yellow lines. It is early blooming, fragrant, and hardy. *Iris Iberica* (Chalcedonian iris) is a showy species with large rich purple flowers, beautifully veined, and spotted with a black spot on each petal. It blooms somewhat later than *Iris reticulata*. There is a well-known pomponian lily, *Lilium*\n*Pomponium*, that blooms comparatively early in June. The flowers are pendulous, scarlet, and attractive. The plant comes from France and grows about three feet high. *Crucianella stylosa* is an ornamental plant, diffusively tufted with a profusion of weak, straggling, procumbent stems clothed with whorls of six or more narrow lance-shaped leaves growing about a foot high. The flowers are borne in small but handsome terminal heads, and are bright rose or pink, with long styles protruding conspicuously beyond the corollas.\n\nI propose now to consider some of the summer-flowering plants, the plants that commence to bloom in June or early July, and oftentimes continue in flower throughout the season. There are many, but we shall attempt to consider only a few. *Achillea tomentosa* (downy yarrow), different from most herbaceous plants, displays striking and attractive foliage, but the flowers are pretty, and of a bright-yellow color. It is only six or eight inches high. The *Aquilegias* or columbines are always quaintly beautiful, and there are none more so than the summer-blooming ones. *A. chrysantha*, the golden columbine, is probably the best, because it produces golden-yellow flowers all summer. Like all *Aquilegias*, the flowers have curious long spurs. *A. caerulea* (Rocky Mountain columbine) has charming blue and white flowers, and is only less valuable than *chrysantha* because it does not bloom all summer. Both of these columbines\ngrow two to three feet high. *Aquilegia vulgaris* (Munday's giant) is of garden origin, robust, growing three feet high, and producing pure white flowers in abundance. *Armeria maritima*, one of the sea pinks or thrifts, bears attractive rose-colored flowers and broad foliage about a foot high.\n\n*Asperula odorata* is the common woodruff of Northern Europe. It grows six to twelve inches high in dense tufts of slender stems with leaves mostly eight in a whorl, and has flat clusters of small white flowers in summer. When wilted this plant has the odor of new-mown hay. The *Campanulas* or harebells are of course well known for their dainty beauty. They are all summer-flowering, but perhaps *Campanula rotundifolia* blooms somewhat earlier than some of the others. It is a beautiful native species, with numerous deep-blue flowers. It grows only six to twelve inches high. To speak of the lily of the valley in praise, or dwell on its charms, would be superfluous, for all the world knows them. The dainty bloom pushes its white bells from the sheathing leaves during the latter part of May into June.\n\nAnd the no less dainty maiden’s pink (*Dianthus deltoides*) comes in early summer also. It is an humble\nplant, six to nine inches high, and the bright-pink or white flowers, with the dark or white circle in the centre, grow out of dense tufts of grassy leaves. Then there is the sweet-william of the gardens of earlier days, *Dianthus barbatus*, with deep crimson flowers, and a height of one to two feet. Finally, there is *Dianthus plumarius*, the garden pink or the cushion pink, forming broad tufts and bearing flowers with beautifully fringed petals and a delightfully fragrant odor. It grows only six or eight inches high. *Dicentra crinum* (plumy bleeding-heart) is a plant from the Alleghany Mountains, nine to eighteen inches high, with leaves as graceful as those of a fern. The flowers are rose-colored, and appear all summer, hanging in graceful racemes. The *Dicentra spectabilis*, scarcely less beautiful, comes earlier. *Iberis correa-folia* (corris-leaved perennial candy tuft) is a beautiful dwarf evergreen shrub, with large pure white flowers.\nThe summer-flowering irises are also important. I mean those that bloom in early summer. The Florentine iris, or the orris root, belongs to this time. It bears large fragrant white flowers with a tinge of blue, and a bright yellow-white tinged with pink or lilac when they have been open for some days. There are generally many flowers completely covering the stem. The Siberian iris is tall with narrow leaves, and white and blue and delicate-veined flowers. *Iris Siberica*, var. *haematophylla*, is a very dark-leaved early flowering kind that often blooms the second and third time during the season. *Linum perenne*, the perennial flax, is attractive all summer, with its tufts of narrow foliage and its bright blue flowers, an inch or more across, which seem, on their slender stalks, semi-detached and floating.\n\nNo garden would, of course, be complete without its peonies and tall phloxes. The herbaceous peonies present every shade of white, pink, rose, red, crimson, and dark purple among their scores of varieties. Their flowers are perhaps the largest and most showy of any we are likely to plant in our garden, and make a great display at a distance. I will mention one kind because it is so unique. *Paeonia tenuifolia*, pl. *pl.*, is different from all others on account of its abundant finely divided foliage, from the midst of which peer out large double brilliant dark-red flowers. The tall phloxes to be seen in gardens\nare usually the annual kinds, but the herbaceous kind, *P. Carolina*, bears beautiful pink-purple flowers, more than an inch across. It grows about a foot high and blooms all summer. *Phlox stellaria*, starry phlox, is a similar free-blooming summer kind of about the same height that bears white flowers.\n\nThe bachelor's-button (*Ranunculus speciosus*, fl. pl.), grows a foot high, and displays large golden-yellow flowers, invariably double. *Silene Virginica* (fire pink) is one of the finest catchflies, and produces brilliant scarlet flowers, an inch or more in diameter, from June to August. It grows about a foot high. Statices are among the best and most desirable herbaceous plants. Their flowers are of long duration, and when cut and dried are effective for winter decoration, as they retain their color in a dried state. One of the best is *Statica latifolia*. It bears in June immense panicles of bright blue flowers, often two feet across. Its native place is Southern Russia, and it only grows about a foot high. The familiar name of this type of plant is wound-wort. Meadow-rue or *Thalictrum*, bearing large panicles of flowers in summer, presents one of its best effects in *speciosum*, a fine large yellow-flowered sort\nwith handsome leaves which grow three to five feet high. Other meadow-rues bear purple flowers, and still others white. One of these white species comes from Japan. The spiderwort (Tradescantia Virginica) is a native plant, valuable chiefly for its continuous production during summer of its peculiar deep violet-blue flowers. Trollius Europeus, European globe-flower, is a pretty plant with large lemon-colored buttercup-like flowers, one to one and a half inches across, on long stems. It grows two feet high, blooms from June to August, and comes from Arctic Europe. There is a large double orange-colored species from Japan that blooms in the spring. Tunica saxifraga, rock Tunica, is a delicate spreading dwarf plant that bears all summer a profusion of small rosy-white flowers. It grows six to ten inches high and is excellent as a carpet plant. Viola cornuta, horned violet, commences to bloom in spring and lasts all summer. It is not unlike the common violet, and its prevailing tints are blue, purple, white, and yellow. It is a valuable violet for this special quality of continuous flowering.\n\nAmong the flowers that bloom still later in summer and even in early fall, I will mention the beautiful Achilleas, or y", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " of these may be currently vacant and available for rent.\n\n4.10 Impact to Personal Property Only\n\nThere are two units in Building One that may consist of personal property only. For these units, the owner of the personal property would receive assistance in searching for replacement sites to store the personal property and for the cost to move the personal property.\n5.0 RELOCATION RESOURCES\n\nAs presently planned, the Transbay Program would require that affected residential occupants and business owners relocate to replacement sites in 2010. Appendix C contains an example of an initial contact letter that the TJPA has sent to affected property owners and tenants.\n\nThe TJPA plans to assist each eligible residential occupant and business to successfully relocate in the community. Much effort has been made to identify sites in the South of Market (SOMA) area that would accommodate the displaced households and businesses. Additionally, the TJPA has investigated the potential that other public projects might compete for available replacement sites during the course of the Transbay Program. In discussions with Caltrans, the City and County of San Francisco, and the San Francisco Redevelopment Agency, the TJPA has learned that no planned public projects would significantly compete for resources in the SOMA area during the planned development of the Transbay Program.\n\n5.1 Residential Condominiums/Lofts\n\nResearch conducted in fall of 2009 identified ten live/work lofts available for sale and twelve live/work lofts available for lease in the SOMA area. The information provided in tables 5.1 and 5.2 is representative of the properties that might be available at the time that the six affected residential households in Building One are searching for comparable replacement housing. It is anticipated that several more similar properties will become available for sale or lease during the course of the Transbay Program and that the residential households will have the opportunity to consider available sites over a six- to twelve-month period. Table 5.1 lists residential live/work lofts recently available for sale in the SOMA area. Table 5.2 lists properties in the same category recently available for lease.\n\nTable 5.1, Demonstration of Available Residential Live/Work Lofts for Sale in SOMA Area\n\n
\n\n
\n
Location
\n
Unit #
\n
Square Footage
\n
Beds/ Baths
\n
Year Built
\n
List Price
\n
List Date
\n
\n\n\n
\n
38 Lusk Street
\n
1
\n
1,359
\n
1/2.0
\n
1995
\n
$1,499,999
\n
7/1/2009
\n
\n
\n
650 Delancey Street
\n
422
\n
1,430
\n
1/2.0
\n
1996
\n
$1,049,000
\n
8/5/2009
\n
\n
\n
650 Delancey Street
\n
213
\n
1,400
\n
2/2.0
\n
1996
\n
$1,298,000
\n
5/21/2009
\n
\n
\n
650 Delancey Street
\n
414
\n
1,769
\n
2/2.0
\n
1996
\n
$1,225,000
\n
6/22/2009
\n
\n
\n
461 2nd Street
\n
656
\n
1,650
\n
1/2.0
\n
1992
\n
$1,195,000
\n
8/13/2009
\n
\n
\n
1 Bluxome Street
\n
406
\n
1,762
\n
2/2.0
\n
2003
\n
$1,249,999
\n
7/8/2009
\n
\n
\n
601 4th Street
\n
3P
\n
1,792
\n
2/2.0
\n
1991
\n
$1,498,000
\n
9/21/2009
\n
\n
\n
601 4th Street
\n
319
\n
1,965
\n
2/2.0
\n
1991
\n
$1,349,000
\n
9/11/2009
\n
\n
\n
712 Bryant Street
\n
5
\n
2,097
\n
2/2.5
\n
2001
\n
$1,039,000
\n
9/17/2009
\n
\n
\n
300 Beale Street
\n
406
\n
1,686
\n
2/2.0
\n
1937
\n
$1,375,000
\n
9/2/2009
\n
\n\n
\nTable 5.2, Demonstration of Available Residential Live/Work Lofts for Lease in SOMA Area\n\n
\n\n
\n
Location
\n
Square Footage
\n
Beds/Baths
\n
Year Built
\n
Asking Rent/Month
\n
\n\n\n
\n
1233 Howard Street
\n
1,400
\n
1/2.0
\n
2000
\n
$3,300
\n
\n
\n
695 5th Street
\n
1,760
\n
2/3.0
\n
1999
\n
$3,495
\n
\n
\n
767 Bryant Street
\n
1,950
\n
2/2.5
\n
2002
\n
$3,500
\n
\n
\n
650 Delancey Street
\n
1,550
\n
2+/2.0
\n
1996
\n
$4,000
\n
\n
\n
200 Brannan Street
\n
1,522
\n
2/2.0
\n
2004
\n
$4,000
\n
\n
\n
200 Brannan Street
\n
1,961
\n
2+/2.0
\n
2004
\n
$5,300
\n
\n
\n
300 Beale Street
\n
1,700
\n
2+/2.0
\n
1937
\n
$5,400
\n
\n
\n
461 Second Street
\n
1,800
\n
2/2.0
\n
N/A
\n
$5,800
\n
\n
\n
300 Beale Street
\n
1,686
\n
2+/2.0
\n
1937
\n
$6,500
\n
\n
\n
1233 Howard Street
\n
3,300
\n
1+/2.0
\n
2000
\n
$5,500
\n
\n
\n
461 2nd Street
\n
1,900
\n
2/2.0
\n
Unknown
\n
$5,800
\n
\n
\n
1233 Howard Street
\n
2,002
\n
1/2.0
\n
2000
\n
$4,080", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " still farther inland. In other words, I analyzed the forces in action.\nand aided and abetted their inclinations. If grasses and twigs had caught on a small projection of the shore and a little vegetation had sprung up and soil thus collected, I lengthened and broadened the projection and planted it with clumps of grasses, such as flag, bamboo, pampas grass, and the hardy *Eulalia Japonica*. Back of these, on more solid ground, I planted a willow and an alder, with some irises, and tender cannas and caladiums or elephant ears. I was careful, moreover, to be conservative even in this natural treatment of my shores. There was no frequent repetition of the promontory and bay idea. At only a few points was any change made in the original line of the shore. Such changes as I did make, however, were forcible and marked and carefully adjusted in the exact direction and angle that the stream would be likely to take when it worked its fantastic way before a rapid current or overflow. Grasses and shrubs suited to low grounds, of the kinds I have named, were scattered in small groups about the points running back, sometimes quite a distance, up the\nbank. In the midst of these groups grew some higher shrubs or small trees like the birch, for the sake of emphasizing the effect and giving variety of sky-line. I do not wish to be needlessly technical, but if you could see the two great Lombardy poplars, forty feet high, bordering and making a frame, as it were, for my place, you would understand what I mean by emphasis. Great towers of green, these poplars seem to be mounting guard over my small domain, and their long shadows at sundown reach far across the stream and the grass of the meadow beyond. I am not going to apologize for my poplars. They were and are grand, and I am proud of them. Tree-experts may warn me that they are liable to borers and bark-lice, and that they lose their leaves early in the season, and in many ways invite the use of the axe. It may be so. I have enjoyed them, however, for a number of years and they are entirely healthy yet, although surely a score of years in age. It will be a long time, therefore, before an axe under my direction will touch them. Even the tendency to lose their leaves early in the season would not induce me to use the axe, for their lofty spire-like forms dominate everything and establish that variety of sky-line so much to be desired by the lawn-planter. Let the limbs be bare and the trunk scarred and seamed with borers, the noble outline is there, and shrubs and small trees can be made to screen the lower and generally uglier portions. It should be remembered also, that an occasional pruning, as the years go on, tends greatly to renew and perpetuate the poplar's health and vigor.\nBut, the reader will say, where is the lily-pond? You have told us about your lawn with its stream and old mill-pond, but where are your lilies? Well, I answer, do not be in a hurry. I assure you if I had not selected and arranged my lawn and water properties as I did, the lilies I might have set out would have been of much less account than they are. Remember the lilies on my former place. In truth, without some of the characteristics of my present lawn the proper setting for the clustering water-lily gems would have been absent. And think what a setting they had now—great poplars, drooping willows, alders, waving grasses, purple irises, purple marsh-mallows growing on promontories of a brimming river backed by a sloping bank of rich greensward. In the coves, chiefly, of my stream and pond were set my lily-jewels. The bottom of the water\nwas deepened and a foot of soil, not in spots but along the entire front, was replaced by the richest mixture I could make of mould and manure. Pond-lilies are great feeders, and I intended to give them the best chance I could to look their prettiest. For the *Nelumbiums* or lotuses considerable clay is needed. Fortunately, my soil had naturally plenty of clay. I used, moreover, other kinds of water-plants besides lilies, and some of them, as well as certain lilies, were tender, coming as they do originally from the tropics.\n\nThe tender ones I bought anew every year, at a moderate expense, from one of the few growers in America. I may have expended during some years one hundred and even one hundred and fifty dollars, but it was a small sum compared with the amount necessary to keep up a greenhouse fitted with suitable tanks. Water-lilies and aquatic plants winter badly in cellars. They are easily excited to grow by a little excess of light and heat, and as easily checked and injured by an excess of cold. Except a few kinds, such as the wonderful blue and purple water-lilies of Zanzibar, which I bought yearly, I have therefore managed to content myself with a number of perfectly hardy aquatics, including some of the best water-lilies and lotuses. Doubtless the biggest, grandest, and most effective of these was the lotus *Nelumbium speciosum*. This plant is the greatest feeder of all, and will thrive prodigiously in the richest, rankest mud that can be concocted. It will, in fact, crowd out most other plants, and should be thinned every year so as to appear in clusters and not in monotonous masses extending from shore to shore. This *Nelum-\nNelumbium\" is widely known in India and Japan as the lotus, and is there considered sacred and is freely copied in their decorative designs. It is also probably the lotus of ancient Egypt.\n\nPicture for yourself a pumpkin-leaf erected three or four feet high on a stem, and great buds that look, for all the world, like gigantic tea-rose buds, and you will have a fair idea of the general appearance of the lotus. Of course, the leaves of the lotus are more finely veined and smoother and more shining of texture, and the flowers grander and richer in tint than the tea-rose bud; but, for all that, the pumpkin-leaf and tea-rose bud comparison is a suggestive one. The botanical name of the lotus, *Nelumbium*, signifying a rose or spray of a watering-pot, is very descriptive of the curious seed-pod. There is a fine *Nelumbium*, native to\nAmerica, a yellow lotus with excellent foliage, which is found in one or two places in New Jersey, but which chiefly abounds in Florida and other Southern and Western States. The leaves of this species are quite as noteworthy as those of the familiar *Nelumbium speciosum*. These are often two feet in diameter.\n\nThe lotus leaves and flowers are decorative and striking in effect, but the true water-lilies, the *Nymphaea*, are, after all, I am inclined to say, the best ornamental water-plants. Following out my Lombardy poplar idea of emphasis, I\nused many lotuses in front of my brook and pond promontories. But in all my experiments with aquatic plants I never chanced on any pond-effects quite equal to that of my coves of *Nymphaea* in midsummer. Fancy a quiet, mirror-like surface of water, studded with clustering masses of lily-pads, enfolding half-open flowers, nestling yet buoyant. Every one is familiar with scenes in woodland nooks resembling this in kind. The remarkable difference on my place was that my trees and shrubs, grasses and flowers, came to the water's edge and were mirrored there, and that in front and about them floated and were reflected lily-pads of excellent size and coloring. The flowers also of these great tropical lilies were especially large and richly hued, some species being pure white, others red, and still others purple and deep blue. I have had these water-lilies and other water-plants growing on my place now for several years, but I confess that, even at the present time, familiar as they are to me, when I look at one of these blue lilies on an early summer morning I am impressed with the scene as an absolute revelation of beauty, a landscape feature positively unique.\n\nI am not going, on this occasion, to give an account of all the aquatic plants I grow. I have the tender *Pontederia crassipes*, a floating plant with curious orchid-like purple flowers, water-poppies, pitcher-plants, cat-tails, and a score of other species and varieties that I shall not enumerate. All these kinds of water-plants doubtless add greatly to the attractions of decorative waters, but, after all, it is the lotuses and lilies, or lilies and lotuses, not giving the precedence to either, that every one ought to want. Having\nonce had them, any decorative piece of water without them will seem almost uninteresting, no matter what other water-plants are employed.\n\nLet me say here, before I forget, that spaces of clear surface among water-plants, with undisturbed reflections, are particularly necessary to secure the best effects. The whole surface of the pond should be no more covered up with water-lilies than fine rocks should be completely masked with climbing vines.\n\nTo explain to the reader which are the tender and which are the hardy kinds would be a lengthy task, and I must refer him to the nearest nurseryman who grows aquatics. Better not", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " punctuated by these white birches. Nature uses the birches most delightfully in many a woodland winter scene, and our lawn is, we find, greatly improved by the free use of this artistic resource. But our attention is specially claimed by the specimens occupying the middle-ground. Here, too, we find a fair admixture of evergreen trees advisable. The evergreens disposed near the foreground are of medium, and in some cases of dwarf size, but always of interesting character, well fitted to make single features on the lawn.\nFirst and foremost is the Nordmann's silver fir, broad and massive, with shining silvery leaves,—in every way a hardy, slow-growing evergreen, of noble outline and special symmetry. Though grand and impressive, it needs intelligent pruning, and for successful transplanting, a fibrous condition of roots that can be secured by frequent removal in the nursery and systematic root-pruning. The same remark applies to all silver firs, which are in many senses the finest evergreens for producing winter pictures. There is the silver fir (*Abies amabilis*), lovely, both by name and nature, and the still finer (*Abies nobilis*), of unsurpassed blue tints. Hudson's Bay silver fir, of the same genus, is one of the darkest, hardiest, and most dwarfed species, specially fitted for the outskirts of groups, or for dotting here and there in isolated positions. Parsons' silver fir (*Abies Parsonsii*) has wonderful leaves, always curling upward, long, and of a delicate bluish-green color. The so-called dwarf silver fir (*Abies compacta*), an intermediate form between Hudson's Bay silver fir and Nordmann's fir, is especially noteworthy for hardiness, symmetry, and compact elegance. It should be one of the most popular of evergreens.\n\nThen, among the larger forms, we note the Grecian silver fir, very fine and lighter-colored. The weeping silver fir is the type, perhaps, of the statuesque in the family. Intelligently pruned, it develops into a solid weeping column of dark green. But here, as with all silver firs, if we are to get a compact growth below, the leading or top shoot must be pinched off from time to time during May or June. If possible or, rather, if not incongruous with the\nORIENTAL SPRUCE.\n(PICEA ORIENTALIS.)\nremaining part of the composition, it is well to place each of these species, firs, spruces, and the like, by themselves. Spruces we used to make up the mass of the background; but then there are spruces not only adapted for this purpose, but suitable for general planting in the middle-ground, and even for the most distinguished positions as objects of special interest in the foreground. Any one looking at the dense round or hemispherical shape of the Gregory spruce, and at the taller though slow-growing columnar form of the weeping spruce, would scarcely believe that this and the common Norway spruce are so closely akin. The blue tint of the Colorado spruce (Picea pungens) shows capacity for varying color that is most invaluable for winter effect. Alcock's spruce, from Japan, has also lovely variegations of yellow, silver, and green, and the tiger-tail spruce (Picea polita), from the same country, is rigid, yellow, and characteristic, and hardy and fine in many ways.\n\nThe Oriental spruce is perhaps the most desirable of all the spruces for both winter and summer landscape. Its shining dense masses are remarkably hardy and striking. It belongs rather in the background, as somewhat larger in habit than the others. Nor should we neglect the beautiful American white spruce, hardy, dense, and richly colored. It grows more slowly than the common Norway spruce, but eventually attains sufficient size to associate it more or less with that evergreen. The most noteworthy spruces, however, for winter-landscape effects are the weeping hemlock spruce and the weeping Norway spruce. The former is a charming evergreen, graceful and picturesque, with soft curving lines. Its light color and delicate tendrils give it\nan almost feminine appearance. The rugged, strong outline of the weeping Norway spruce, on the other hand, offers the greatest contrast to the habit of this hemlock, and delights the eye, especially in winter. The long branches of this slow-growing evergreen droop and hug the stem in most persistent fashion, now and then curling up eccentric shoots, which afford convenient lodgment for the snow. Both these striking evergreens should occupy the middle-ground of the picture in specially effective positions. A cedar of Lebanon, where a cedar of Lebanon can be coaxed to grow, is also a prize on the winter lawn.\n\nAmong the pines we find, perhaps, our most lovely and refined winter colors, but to establish pines upon the lawn is not always easy. Unless transplanted frequently in the nursery, pines develop naked roots, hard to remove with safety. The spruces and arbor vitae act better, but silver firs and pines are, to say the least, troublesome in this respect. The most lovely pine, to me, in winter is the\nBhotan pine (Pinus excelsa). It presents such picturesque open masses, and the leaves are so long and delicately green that the eye dwells on its varied outlines with exceeding pleasure.\n\nThen there is the Swiss stone pine (P. cembra), bluish-green, and extremely striking in winter, as well as extremely hardy. Among the dwarf pines such forms are noteworthy as the dark mughus and mughus compacta, the finely-tinted light-blue dwarf white pine, and the more yellow and rounder dwarf Scotch. Mughus uncinata is also striking, and, although dwarf, quite erect in habit. The large-growing pines massed in the background among the other large spruces are peculiarly varied in color and form, and often very beautiful, laden with snow and ice. Dark, massive Austrian pines should have their forms displayed somewhat more prominently than the rest, while the delicate-hued and more sparsely-branched white pines should be grouped directly with the Norway spruces, for the sake of artistic breadth combined with interesting variety.\nHemlocks also mass well in the background, their lighter colors and more graceful forms relieving the sombre character of the adjoining spruces.\n\nIn the outskirts of groups and rather in the foreground, we should find choice plants, such as the rare and exquisite golden Japanese or sun-ray pine (*Pinus Massoniana variegata*), with its rich and permanent yellow, so striking in fall and winter, and the slow-growing and extremely rare Japan parasol pine (*Sciadopitys verticillata*), a highly prized and strange-looking tree, with dark green foliage growing in distinct whorls. Nor should we forget to plant in such positions the lovely Japanese *retinosporas*, of delicate, fern-like appearance and unexcelled hardiness of habit.\n\nSuch plants form the intermediate shadings or half tones of the picture, presenting as they do in winter the most delightful tints of brown, green, and gold. It should be remembered that the winter coloring of evergreens is very different from that of summer. In many cases, like that of\nthe arbor vitae, these winter tints are dull and uninviting, for which reason, in spite of the custom to the contrary, I do not much fancy their employment for winter effects. But the *retinosporas* are, if anything, more lovely in winter than in summer, especially in their mingling of brown and gold. The really golden *retinosporas* have a pure yellow color in winter, very delightful from the fresh contrast it affords to the neutral tints of the surrounding scenery.\n\nOf like character is the bronze gold of *biota elegans* *tissima aurea*, a Chinese golden arbor vitae. There is a kinship in the appearance of *retinosporas* and arbor vitae, in which the former have greatly the advantage in varied beauty; but we will do well to employ the golden bronze of the *elegans* *tissima* arbor vitae whenever we can give it a little favoring protection from cold, which is fortunately not needed for the *retinosporas*. There are exquisite bluish-tinted junipers, also, erect and torch-like in shape, the graceful lines and forms of which can be ill spared from any part of the lawn planted for winter effect.\n\nThe regular evergreen shrubs cannot, of course, be neglected. *Rhododendron* foliage is broad, massive, and shining, one of the most effective features in winter on any lawn. The mahonias, though very different in many ways, have the same general effect, and should be employed, though always with the knowledge that they will frequently winter kill, that is, become deciduous, for they rarely die from cold. Masses of these mahonias shine and glisten in winter, and are altogether so fine that we must have them, notwithstanding their weakness. The tree box is also rich, solid, and very attractive during the cold\nMUGHO PINE.\n\n(PINUS MUGHUS.)\nmonths, although not always very hardy in the Northern States. It is an old plant, but merits, especially planted singly, the very highest consideration.\n\n_Cotoneaster or Crataegus pyracantha_, the evergreen thorn, whether used for hedges or as a single plant, is always peculiarly beautiful in winter. Its low, dense masses of red bronze leaves, small and regularly formed, present a diversity of contour of the most pleasing character. Sometimes a large", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " 4.1, Summary of Residential and Business Occupants of Building One\n\n
\n\n
\n
\n
Residential
\n
Business
\n
Other
\n
\n\n\n
\n
Owner-Occupants
\n
2
\n
\n
\n
\n
\n
Tenant-Occupants
\n
4
\n
4
\n
\n
\n
\n
Personal Property Only
\n
\n
\n
2
\n
\n
\n
Investment Property Owners
\n
8
\n
\n
\n
\n\n
\n\nThe residential and business occupants of Building One may be eligible for relocation assistance. The owners of investment properties in Building One also may be eligible to receive assistance.\n\nThe TJPA anticipates that any eligible occupants will be provided with relocation assistance so that they could relocate to replacement sites in 2010. Table 4.2 describes the current occupants of Building One and their anticipated relocation needs.\n4.1 Impact to Residential Occupants\n\nThere are six households that would be required to relocate if the TJPA were successful in acquiring the properties in Building One. Of the six households, two are owner-occupants and four are tenant-occupants. Two of the tenant-occupants are also business occupants.\n\n4.2 Overcrowded Conditions\n\nThe TJPA has determined the following Housing Occupancy Standards pursuant to the San Francisco Housing Authority’s Housing Standards for Section 8 Tenant Based Assistance:\n\n
\n\n
\n
Housing Occupancy Standards
\n
\n\n\n
\n
Studio
\n
\n
\n
One-Bedroom
\n
\n
\n
Two-Bedroom
\n
\n
\n
Three-Bedroom
\n
\n
\n
Four-Bedroom
\n
\n\n
\n\nIt is anticipated that overcrowding conditions do not exist in Building One; however, any households that need larger replacement housing units in order to meet these standards will be provided the necessary additional assistance to secure replacement housing that better accommodates the size of their households.\n\n4.3 Accessibility Needs\n\nIt is assumed that most occupants of Building One do not have physical restrictions that require alternative access. If an occupant reveals that any special needs exist, the TJPA would provide any\nadditional advisory assistance that is needed to identify and secure housing that is fully accessible to the occupant.\n\n4.4 Other Special Needs\n\nNo other special needs are anticipated to relocate the occupants of Building One; however, the TJPA is committed to making the relocation process as smooth as possible and will provide additional assistance as needed.\n\n4.5 Language\n\nIt is assumed that most occupants of Building One speak English as their primary language; however, if language assistance is necessary, the TJPA will make every reasonable attempt to communicate with those households in the household’s native language, to provide all informational material in the native language, and to provide the necessary additional advisory assistance to secure replacement housing.\n\n4.6 Current Occupancy and Affordability\n\nThe Medium Family Income in San Francisco is $96,800. Federal regulations state that if a tenant-occupied household qualifies as “low-income” by the U.S. Department of Housing and Urban Development’s Annual Survey of Income Limits for the Public Housing and Section 8 Program, then replacement housing costs should not exceed 30% of the household’s monthly gross income. It is assumed that none of the tenant-occupants of Building One are low-income. If it is determined that a tenant-occupied household is in fact low-income pursuant to federal regulations, the TJPA may need to apply the Last Resort Housing Program so that rent for a comparable replacement site will not exceed 30% of the household’s gross monthly income.\n\n4.7 Transportation\n\nIt is assumed that most occupants of Building One use public transportation; therefore, replacement housing should also be near public transportation.\n\n4.8 Employment\n\nMany places of employment are within walking distance of Building One or easily accessible via public transportation. Every attempt will be made to identify replacement housing that will provide similar access to places of employment.\n\n4.9 Impact to Business Occupants\n\nThere are eight investment property owners in Building One that do not occupy the building, also referred to as “absentee landlords.” There are four business occupants of Building One that would be required to relocate if the TJPA were successful in acquiring the private properties in Building One.\n\nThe businesses are assumed to consist of general office space. Some of these may be currently vacant and available for rent.\n\n4.10 Impact to Personal Property Only\n\nThere are two units in Building One that may consist of personal property only. For these units, the owner of the personal property would receive assistance in searching for replacement sites to store the personal property and for the cost to move the personal property.\n5.0 RELOCATION RESOURCES\n\nAs presently planned, the Transbay Program would require that affected residential occupants and business owners relocate to replacement sites in 2010. Appendix C contains an example of an initial contact letter that the TJPA has sent to affected property owners and tenants.\n\nThe TJPA plans to assist each eligible residential occupant and business to successfully relocate in the community. Much effort has been made to identify sites in the South of Market (SOMA) area that would accommodate the displaced households and businesses. Additionally, the TJPA has investigated the potential that other public projects might compete for available replacement sites during the course of the Transbay Program. In discussions with Caltrans, the City and County of San Francisco, and the San Francisco Redevelopment Agency, the TJPA has learned that no planned public projects would significantly compete for resources in the SOMA area during the planned development of the Transbay Program.\n\n5.1 Residential Condominiums/Lofts\n\nResearch conducted in fall of 2009 identified ten live/work lofts available for sale and twelve live/work lofts available for lease in the SOMA area. The information provided in tables 5.1 and 5.2 is representative of the properties that might be available at the time that the six affected residential households in Building One are searching for comparable replacement housing. It is anticipated that several more similar properties will become available for sale or lease during the course of the Transbay Program and that the residential households will have the opportunity to consider available sites over a six- to twelve-month period. Table 5.1 lists residential live/work lofts recently available for sale in the SOMA area. Table 5.2 lists properties in the same category recently available for lease.\n\nTable 5.1, Demonstration of Available Residential Live/Work Lofts for Sale in SOMA Area\n\n
\n\n
\n
Location
\n
Unit #
\n
Square Footage
\n
Beds/ Baths
\n
Year Built
\n
List Price
\n
List Date
\n
\n\n\n
\n
38 Lusk Street
\n
1
\n
1,359
\n
1/2.0
\n
1995
\n
$1,499,999
\n
7/1/2009
\n
\n
\n
650 Delancey Street
\n
422
\n
1,430
\n
1/2.0
\n
1996
\n
$1,049,000
\n
8/5/2009
\n
\n
\n
650 Delancey Street
\n
213
\n
1,400
\n
2/2.0
\n
1996
\n
$1,298,000
\n
5/21/2009
\n
\n
\n
650 Delancey Street
\n
414
\n
1,769
\n
2/2.0
\n
1996
\n
$1,225,000
\n
6/22/2009
\n
\n
\n
461 2nd Street
\n
656
\n
1,650
\n
1/2.0
\n
1992
\n
$1,195,000
\n
8/13/2009
\n
\n
\n
1 Bluxome Street
\n
406
\n
1,762
\n
2/2.0
\n
2003
\n
$1,249,999
\n
7/8/2009
\n
\n
\n
601 4th Street
\n
3P
\n
1,792
\n
2/2.0
\n
199", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": ", we can say it has more effective, shining evergreen foliage, but on the other hand, the hardy azalea endures more steadfastly winter and summer vicissitudes.\n\nSuch plants as these should be employed in favored nooks, on a hillside, if possible, where the eye may look down upon their charms. The employment of both of these attractive plants is rapidly becoming an actual necessity to the well-ordered lawn.\n\nNor does the fact that the rhododendron occasionally suffers from sudden changes, both in summer and winter, seriously check its growing popularity. Many, in fact, are\nalready learning that a little protection by planting in the lee of other trees, and a practical consideration of the pedigree of the variety used, considered with regard to the more or less hardy nature of its ancestors, will secure general results of the most satisfactory character. _Azalea nudiflora_ is a good example of this genuine American plant of the azalea type.\n\nIn this connection, however, I must not fail to offer meed tribute to the excellent beauty of the common laurel of the American woods, _Kalmia latifolia_. While its flowers, perhaps, are not as splendid in form and mass as those of the rhododendron, nor as varied and subtle in coloring as those of the hardy azalea, the curious, quaint construction of its flower-cup is yet quite as distinguished in its way for its exquisite daintiness and charming symmetry. It surpasses the rhododendron, moreover, in hardiness, and possesses the attraction of comparatively large evergreen leaves, which the deciduous hardy azalea does not possess. When grown in the nursery, i.e., transplanted now and then, the _Kalmia latifolia_ may be readily moved at any age, but to tear old plants from their native haunts in woodland nooks and plant them successfully on the lawn, has been repeatedly proved to be a difficult operation.\n\nAs we give our attention more closely to deciduous shrubs, we are impressed by the number of specially noteworthy genera that distinguish themselves in June either by their foliage or their flowers. What a lovely group, for instance, are the various June-blooming spireas.\n\nThere were, as we remember, fine spring-flowering spireas like _S. Thunbergii_, but how lovely, also, are June-\nflowing *S. Reevesiana*, *fl. pl.*, and *S. trilobata*, a similar but still more attractive species. The branches of these spireas hang during June in the most graceful curves studded to their very tips with lovely rosettes of pure white flowers.\n\nThen there is *S. prunifolia* with upright habit, neat, bright green leaves and numerous white flowers coming in late May oftener than in June. Red-flowering *S. Fortunei* and *Fortunei marmophylla* and *havigata* are also June-flowering, while among other kinds blooming in the same month may be noted the choice and delicate little spireas *bella* and *aristifolia* and the more common-looking and larger-growing *chamaedrifolia*, *nepalensis*, and *ulmifolia*.\n\nOne of the most striking of all spireas on the lawn, however, is the June-flowering *S. opulifolia aurea*. The leaves of *S. opulifolia aurea* are broader and larger than those of any other spirea, which is generally a small-leaved race, and the colors, especially at this season, are delicate shades of gold. Indeed so effective is this golden color that had the white flowers studding the entire stem been less lovely I would have classed it among the golden- and purple-leaved plants. If we add to these qualities exceptional vigor and hardiness, it will be readily seen that *S. opulifolia aurea* is a shrub peculiarly adapted to lawn planting. Indeed the general habit and the flowers render the common type *opulifolia* almost as fine as the golden variety.\n\nBut I must not linger on these interesting spireas too long, while there are other interesting June-flowering shrubs waiting to claim our attention. Every well-planted lawn must have some Philadelphuses or mock oranges, with\nJune flowers like veritable orange blossoms. *Philadelphus coronarius* is the most sweet-scented and in other ways the best variety, although *grandijlorus, lurus, speciosus*, etc., are larger and more easily propagated. There is a fine dwarf golden Philadelphus that does not receive the attention it should.\n\nA well-known June-flowering genus of shrub is the *Deutzia*, not *Deutzia gracilis* only, but *Deutzia crenata, fl. pl.*, a Japan plant, strong-growing, and bearing masses of attractive pinkish-white flowers, and also the smaller *D. scabra, fl. pl.* There are also *Deutzias Fortunae, crenata and scabra*, both interesting, hardy, rapid-growing shrubs. The vigorous bright-green bush honeysuckles are also attractive in June, with the red and white flowers of *Tartarica*, the white of excellent drooping *fragrantissima*, and the yellow and yellowish-red of *xylostemon, fliusa*, and *Ledebouri*.\n\nThe sweet-scented shrubs *Calycanthus floridus* and *C. levigatus* likewise offer the spicy fragrance of their\nchocolate-brown buds and broad rich foliage. These are choice shrubs and can scarcely be used too much in the salient points of shrub groups.\n\n*Exochorda grandiflora* should have been mentioned perhaps among the spireas, where it properly belongs, but it is so different in every way, so specially suited to distinct single positions, that I have ventured to consider it apart from the other varieties. Few shrubs are more difficult to propagate than this spirea, hence its reputation for rarity and choice-ness. But aside from these qualities the leaves and flowers of this plant are very attractive, the leaves for their light green, slightly bluish tint, and the flowers for their number and pure white color, wonderfully bright and effective in mass. The general habit of the plant is broad, bushy, and vigorous. In this climate the\nflowers appear in late May and early June. The pretty, small-leaved *Kerria Japonica* also bears attractive yellow flowers in June and makes an interesting shrub on the outskirts of shrub plantations.\n\nAmong the large shrubs specially suited to the centre of a mass of deciduous foliage are the *Weigelas* or *Diervillas*. They are rapid-growing, bearing abundant leaves and flowers, and are generally popular. They form one of our staple plants for the construction of any group of shrubs. Some of the *Weigelas* bear light-red and others striped flowers. *Weigelia rosea* is justly considered one of the best kinds.\n\nAmong the most attractive of June-flowing shrubs is *Tamarix Africana*. There are one or two other kinds that bloom during this month, but none better than *T. Africana*. The characteristic feathery habit and great vigor of the tamarisks renders *Africana* specially valuable in a group of shrubs where variety of form and beauty of flower are desired. There are several late-blooming tamarisks, such as *Gallica* and *Indica*, which makes this June-flowing *Africana* particularly valuable. Pruning is absolutely essential to keep the lanky growth of tamarisks in subjection.\n\nWe come now to a very noteworthy genus among June-flowing shrubs. The snowball or viburnum genus is a\nlarge one, but only half a dozen hardy varieties are thoroughly well suited to lawn planting. The common snowball (*Viburnum opulus*) is, perhaps, one of the most generally useful on the lawn, because it is fine, singly or in mass. It grows vigorously, and is broad, and bears numerous balls of snow-white blossoms. The only serious fault it has is an openness of foliage or nakedness of stem that makes it less effective when planted singly than it would otherwise be.\n\nAs a June-flowering viburnum, however, there is nothing like the Japan snowball (*Viburnum plicatum*), already spoken of in the highest terms elsewhere. Dark green and glossy leaves, crinkled and compact, especially if well pruned, and large white balls of flowers, persistently retained on the plant for weeks, are, as we have also seen, its distinguishing characteristics. Good judges have commended this plant as in many senses the best of deciduous shrubs.\n\nAnother June-flowering shrub of considerable merit should not be neglected. *Lycium barbarum*, etc., is an old plant, but very pretty, especially when trailing over rock-\nwork. The flowers are small and of a purple or violet color. Many of these fine old hardy plants are in danger of being forgotten in the rush for new and rare varieties.\n\nA special glory of June, a glory entirely unequalled in its way at any other time of the year, is found in the several genera of hardy climbing vines. Many of them are, of course, familiar to the reader, and probably none more so than the honeysuckles. They make a numerous family of varieties, with thick, glossy green leaves and abundant sweet-scented flowers. The Belgian, or striped monthly, red and white, is perhaps at once best known and most generally popular", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": ", standard honeysuckles, and philadelphuses.\n\nThe lily-pond is of irregular form, bordered with rocks and planted at intervals with lotuses, water-lilies, Cyperus papyrus, and the quaint and charming floating pontederia.\n\nThus we have made the round of the park and come to the Casino Restaurant, which is worth visiting in early or late May of all seasons, for the sake of the wonderful wistaria effect crowning the Pergola, a summer shelter overlooking the Mall at this point. The purple clusters of flowers lie in piles among the tossing tendrils and leaves until against the blue sky beyond the effect is that of a purple and green cloud resting on the arbor.\nBefore concluding this brief itinerary of the park, however, I must take the reader on horseback, as it were, to two or three bits of charming scenery on the bridle-paths, which can be seen nowhere else as well. The first is on a curve around the southwest side of the lower green near Seventh Avenue and 59th Street. There is a great rock here, and an ever widening meadow, with a distant view over another meadow and plenty of trees and shrubs round about. The sweet influences of spring at this point are not to be surpassed anywhere else in the park.\n\nAnother charmingly secluded spot may be found by passing up the bridle-path to the stone bridge at 77th Street and Eighth Avenue to a pool of water with a loop road leading to the water’s brink and a great sheer rock on the opposite shore. The shrubs on the bank at this point are attractive, in both spring and autumn, including spireas, dogwoods, *Lonicera fragrantissima*, weigelas, privets, and masses of honeysuckles over the small rocks on the edge of the water, and *Ampelopsis tricuspidata* and Virginia creepers on the stone bridge and sheer rock. I would advise the reader to mount a horse and ride through the park, if only for the opportunity of sauntering down this loop bridle-path at 77th Street and Eighth Avenue.\n\nThere are, besides, choice bits of landscape along the bridle-paths between 81st Street and 86th Street and up by 97th Street among the pin-oaks. But in no other way can the great North Meadow be seen so well as on horseback from the bridle-path that runs round its entire extent. On the east side the bridle-path is completely embowered\nwith trees, and from these you look out with peculiar enjoyment over the expanse of the North Meadow.\n\nThere are five and one half miles of bridle-paths, and nine miles of drives, and thirty miles of foot-paths in Central Park. Altogether, there are eight hundred and fifty acres in Central Park, including the one hundred and fifty acres of reservoir.\n\nIt might doubtless be interesting to speak of many other individual features of marked interest in Central Park. I do not, however, think it expedient in such a general description and illustration of general principles as this to be drawn into such emphasis of details. Indeed, the manifest superiority of the design as a whole is its general adequacy to the effect sought, which was simple park scenery in the midst of a city.\n\nThis seems a proper place to remark that another great attraction possessed by Central Park is the essential unity of its design. Here is a park laid out on paper according to definite artistic conceptions and then executed substantially as conceived in the beginning.\n\nBefore closing my remarks on Central Park I desire to direct especial attention to the popular-amusement feature insisted upon in its arrangement. The chief and most important office of Central Park is not to furnish agreeable driving territory for the beau monde, the millionaires, and the lovers of horseflesh. It is not a scheme to please and attract the fashionable, but it is a playground for the young people, a pleasant open-air breathing space for the mothers and fathers who desire to go into the country and cannot get there.\nAs a part of this scheme for the pleasure and well-being of the multitude there is music on the Mall twice a week, goat-carriages, donkeys, merry-go-rounds, summer-houses, grounds for croquet, lawn-tennis, base-ball, foot-ball, and lacrosse, and, above all, grounds everywhere for picnics in spring and early summer. Last year there were picnic permits issued to over seventy-five thousand children, whose wants were ministered to by park employés without charge.\n\nIn order to secure the greatest amount of pleasure from these games, the turf requires special and solicitous attention. It must be mown frequently, and manured yearly; and above all it must not be used when soft from rain, and liable to be torn up by the feet of visitors.\n\nBefore closing this chapter on city parks, I must say a few words about small city squares or greens. They are generally not large enough to consist of more than a few square yards or half a dozen acres. Usually they come on some irregularly shaped space situated at the junction of two or more streets. Properly they should be termed \"Greens,\" like the Bowling Green, at the foot of Broadway, New York City. The green effect of the grass should be made the chief and most important feature of their treatment.\n\nSome fence of a simple and inconspicuous character should surround the plot, and this fence should be masked and ornamented with shrubs and trees, but the interior should be simple open greensward, with a few bright bits of bedding, and trees enough for shade along the paths. The semi-artificial lines and masses of formal bedding are out of place in the strictly rural scenery of Central Park,\nbut in the city parks they look well amid the architectural lines of the surrounding buildings.\n\nEvery small city park should have a widening of the pathway towards the centre, and if possible an open plaza where the children may play and the visitor linger. Architectural adornments may properly be employed in small parks, so long as they do not seriously interfere with the open grass effect. There may be even busts or statues, but especially suitable are drinking fountains, and fountain basins, with great sprays of water.\n\nThe fountain basins may be effectively ornamented with lotuses, water-lilies, and other decorative water-plants. All such adornment of small city squares or greens tends to appropriately enliven and enrich the general appearance of a crowded city, where the effect of everything is artificial, and more or less formal or tedious.\n\nI should warn those who propose to plant these small city squares, that the surrounding conditions are not primarily favorable for the growth of plants. The air is apt to be hot, dry, and dust-laden, if not actually impure. Consequently the soil should be thoroughly enriched, and the most vigorous and hardy trees and shrubs employed. Evergreens seldom do well in large, crowded cities. It is better to plant certain hardy, deciduous trees and shrubs, such as the privet, weigelia, snowball, *Spirea opulifolia*, American thorn (*Crataegus Crus-galli*), philadelphus, American elm, honey-locust, American linden, Norway and sugar maples, and the Oriental plane trees.\n\nThe care of these small city squares is often difficult on account of the crowds that congregate or pass through, and\non account of the heat and dust, but it can be done by continual watering, cleaning, and cultivating. Canal Street Park, New York, is situated in perhaps the most difficult position in the city of which it is possible to conceive. The surrounding houses are tenements, produce stores, and the like, and the incessant traffic consists largely of trucks and carts, laden with coal, refuse, vegetables, and the roughest material. Dirt is ubiquitous, and the heat at times is great. And yet the grass is always green here, and the shrubs, trees, and bedding plants, always thriving. The park is only 195 feet long by 69 feet wide, but it occupies the entire attention of one gardener, and two police officers, either one of whom is on guard at night and during the day.\n\nIt is a pleasure to see the mothers with their children gather here on the settees throughout the long sultry summer nights, and realize that this unspeakable boon can be secured at such comparatively low cost. Every city should seek to adorn these small greens, to increase their number, and to enlarge their boundaries.\nCHAPTER XV.\n\nRAILWAY, CHURCHYARD, AND CEMETERY LAWN-PLANTING.\n\nA RAILWAY LAWN.\n\nAn encouraging sign of the times is the interest which has been manifested of late by our railroad officials in the appearance of the stations on their lines. Many of these buildings and surroundings, which were formerly eyesores, have been so beautified by the judicious expenditure of some thought and a little money, that they now lend an added charm to the landscape; and were they to be removed, they would be missed with regret.\n\nI had occasion lately to visit one of these recently improved stations. The natural surface of the ground rose rapidly in the rear of the building, and along the edge of the great rock mass, cut through just here by the railroad, gurgled a small, tumbling rill across the road, under a board or two. Except just about the station, where everything\nhad been thoroughly cleared away, bits of rock abounded, and these had been utilized in a picturesque manner. Immediately around the station ran a carriage road, with a convenient oval circuit for turning. On one end of this circuit, near the station, was a weeping beech, and the other extremity was occupied by a group of flowering shrubs, that, although too freshly planted to blossom that year", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " then, and an evergreen has never that cheerful enlivening aspect presented by the green of deciduous trees.\nWe propose to include no plants the foliage of which suffers from mere white frost, and even to include some the leaves of which will endure a severe freezing without injury to their beauty. There is doubtless a season in late August and early September, during which the lawn should be carefully supplied with such foliage and flowers as will yet flourish; but we have chosen a later period, which is sometimes deferred until the middle of October, and which is more neglected and needy.\n\nOne would think the maples would be valuable for their green in fall and so they unquestionably are. They are healthy, thrifty, and vigorous, but no variety very remarkable for its late green exists among them unless it be the little colchicum maple, properly called *Acer latum*. The foliage of this tree is pleasing and of curious outline. Delicate red stems support the leaves, and the general appearance is bright and cheerful. It is a choice, uncommon maple, to which I have already referred with respect, and should be more employed as a single specimen on the lawn.\n\nThe common catalpa (*C. syringafolia*), much spoken of nowadays for its enduring wood, and most valuable to the lawn planter for broad, shadowy foliage, retains its green color well in fall. There is also a dwarf form, *C. Bungeii*, sometimes misnamed *Kampferi*, rounded like a hemisphere, with very delicate autumnal greens. The *Aralia Japonica* is drooping and graceful and effective in its autumn green.\n\n*Chionanthus Virginica*, the white fringe, old, well-known, and choice, is not usually spoken of for its autum-\nnal beauty. The reputation of the exquisite lace-like flowers has doubtless eclipsed the glory of the foliage. It is large for a shrub, lustrous and oval in contour, and the leaves have a dark, rich green in fall.\n\nThe American persimmon is a noteworthy tree for its green in fall; but the Japanese persimmon, or kaki, shows a richer, glossier foliage, like orange leaves in color. Unfortunately, it is not hardy in the Middle and Northern States.\n\nFew shrubs are prettier in the fall than the evergreen thorn (Cotoneaster or Crataegus pyracantha). The small glossy dark-green leaves and orange-colored berries, all protected by masses of thorns, characterize the finest foreign Crataegus which is thoroughly healthy in America, as it is also attractive in very late fall and even winter.\n\nCercis Japonica, the Japan Judas tree, has heart-shaped leaves, glossy, tough, and retained late in fall. It is rare and choice, and decidedly attractive both for its flowers and leaves during at least five months of the year. In spring, early pink flowers wreath the stem, before the leaves put forth.\n\nThe best green-leaved spirea in fall is, perhaps, S. pruni-\nwhich assumes still richer colors as a late autumnal garb. *Spiraea crispi*folia, rare, and recently introduced from Japan, is a variety of *S. bullata*; a dwarf mass of rounded, curling foliage, it is well preserved in fall.\n\n*Spiraea laurifolia*, or *S. pentandra*, the laurel-leaved willow, preserves a shining green late in the season. The ornamental value of this tree is not sufficiently considered. It endures all exposures and soils, even close to the seashore, and is always clean and thrifty.\n\nThe elms are remarkably deficient in attraction during the fall, with one or two curious exceptions. The one specially notable is the weeping—so called slippery—elm, or it may be simply a variety of the American, which grows with great rapidity, and has a fine vigorous foliage. So rapid is this growth that grafts made in the spring will attain six or eight feet during the following summer. We see a specimen before us, while we are writing, where a large American elm has been stripped of its branches and grafted at numerous points with cions of this weeping elm. The effect produced after a few years has been most extraordinary. Long, pendent branches, clothed with luxuriant foliage, swing and wreathe themselves about against the sky like gigantic snakes. The most valuable quality of this choice tree lies in the fact that its foliage is frequently green until October, and always green weeks later than most other elms. There is one other elm which is rare—*Ulmus parrifolia*—that holds its green so late that it might be classed with oaks and beeches for this peculiarity. It is of moderate growth, and has rough, slightly curled foliage, grouped closely along the branches.\nSo far as we know, the lindens can only boast of two varieties that remain really green in fall, viz.: *Tilia dasy-styla* and *T. sulphurea*, golden-barked trees with bright green foliage. All other lindens fade soon, and become almost unsightly in early autumn, so that the green foliage of these varieties seem very curious to behold in October. The effect of the unusual season of such coloring is increased by the strong contrast afforded by a bright yellow bark and a singularly lustrous foliage.\n\nBut the noblest trees of bright green and other good qualities are the beeches and oaks, rich in color and picturesque in form, always affording grateful shade; other trees may possibly be as fine in some peculiar fashion, but\nnone can be more generally satisfactory. Not specially early in spring in putting forth leaves, they are most beautiful in June, and indeed throughout the summer. In\n\nautumnal landscapes, however, their late foliage, almost evergreen during mild winters, performs a valuable part, for the very reason that there is now so much less beauty among trees than earlier in the season. All kinds of beeches are fine in the fall. The cut-leaved, the purple, and the common American and European beeches are all most effective and green until winter; but the noblest of all is the celebrated weeping beech. Its great, gleaming masses of foliage assume all kinds of fantastic shapes, and reveal bowers and recesses until the leaves of almost every other\ntree have taken their departure.\n\nTo me the American beech *Fagus perruginea,* is no less beautiful than the European species and variety. The foliage is delicate in finish, and it lies in an arrangement of layers that is peculiarly attractive. The only other rival the beech really has in late fall, is the oak. Strong, sturdy, and picturesque, enduring and grand, it is admired by every one and planted by few. It transplants with difficulty and grows slowly; but when once established it is well worth the patience it has demanded. All oaks are fine in fall, and in many cases preserve their leaves fresh and green into November and later. Indeed, though we have no really evergreen oaks in the North, there are seasons when some oaks, notably the pyramidal, retain a few leaves all winter. The willow-leaved oak, as well as the pin oak, and the rare, large-leaved *Daimio* from Japan, among others, are very beautiful in fall, sometimes even in late November and December.\nDid space permit, we should like to dwell on the beauty in autumn of various privets, *Daphne cneorum* of tiny evergreen foliage, and certain of the *Elmagnus* species, notably the gray *E. Hortensis* and the robust *E. longipes*, with large leaves and red berries, as well as the beautiful fall climbers, evergreen honeysuckles, *Akebia*, Virginia silk, etc. All these should be planted with taste here and there about the lawn, supported by occasional masses of rhododendrons, laurels, mahonias, and other evergreen shrubs. Thus adorned, the lawn, in the fine air and lights of autumn and during bright days, may well tempt us to linger amid its yet beautiful foliage, where crimson and gold are mingled plentifully with green.\nCHAPTER VII.\n\nAUTUMNAL COLOR ON THE LAWN.\n\nThe supreme point of our enjoyment of lawn-planting is reached when we have compassed in our grounds the loveliest effects of color. Although this is a fact, I fancy we seldom consciously attempt to compass these color effects. A dress pattern is selected, the tints of every part of the room, both walls, furniture, and floor, are studied with the critical eye of genius, but when we come to the lawn, composition of any kind is seldom attempted, much less a harmonious disposition of color.\n\nIndeed, I believe, when any one does more than stand specimens about wherever they may happen to come, form is apt to receive first and almost exclusive attention. A pyramidal tree, a broad-spreading tree, a tall tree, a dwarf tree, secures a certain amount of attention for its proper disposition, but the foliage might be, to all intents and purposes, one shade of green for any consideration color re-\nceives in the special grouping and arrangement. Even Central Park, New York, the most notable landscape-gardening essay in America, has always impressed me as defective in studied color effects of foliage. This is doubtless caused in part by a want of sufficient variety in the large masses of the plants employed. Twenty-five years ago, when the Park was planted, there was likewise a much smaller variety of ornamental trees in the nurseries than there is at present.\n\nYet, notwithstanding this apparent neglect of color in lawn-planting of the present day,", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " of British Caribbean philately. You can find a detailed catalogue of available material at the BCPSG website,\n\nhttp://www.bcpsg.com\n\nYou can also ask about specific titles, or learn more about borrowing by mail from Librarian Dale Wade, P.O. Box 491, Hayesville, NC 28904. He can be reached by electronic mail at:\n\nrxfire@frontier.com\n\nBRITISH WEST INDIES STUDY CIRCLE PUBLICATIONS\n\nTHE LOCALLY OVERPRINTED SPECIAL DELIVERY STAMPS OF BAHAMAS, 1916–17\n\nby\n\nPeter Fernbank, FRPSL\n\nThis Study Paper examines the Special Delivery agreement made between Canada and Bahamas in 1916. National Archive sources in both Canada and the UK have been investigated to provide an in-depth review of the Canadian and Bahamas Post Office procedures for dealing with such mail. There has been some misunderstanding regarding the full validity of Canadian covers with a Bahamas Special Delivery stamp affixed, and a grading system is provided for assessing such covers. Further sections define the three settings of the overprint for each position in the sheet, and go on to examine in detail the major errors that exist on this issue. This work sheds much new light on the subject and reveals that in the past there have been a number of misconceptions regarding this issue.\n\nPrice:– £19.00 (approx US$30.00).\nBWISC Members’ Discount:– £3.00 ($4.50).\n\nThis book and others published by the BWISC can be ordered from:–\n\nDavid Druett, Pennymead Books, 1 Breerton St., Knaresborough, N. YORKS. HG5 8AZ. Tel:– 01423 865962 or Fax:– 01423 547057 or E-mail: Pennymead@aol.com. N.B. Postage and packing is extra. Orders will be dispatched with invoice and prompt payment is requested. Payment may be made by Sterling or US or Canadian dollar cheque or by PayPal. Payment may also be made in Euros in cash only. All books published by the BWISC are displayed on www.bwisc.org and on www.pennymead.com.\nFor decades we have had the great pleasure of working closely with our clients in the formation of many fine private and international exhibition standard collections. I will be pleased to place our expertise at your disposal.\n\n■ 30 Volumes in all price ranges, individually stocked!\n■ You may acquire exactly those items that you need!\n■ Receive on approval (references please) or per quotation!\n■ Scott or Stanley Gibbons numbers!\n■ Prompt, expert service!\n\nGeorge W. Holschauer\n\nCOLONIAL STAMP CO.\n\n5757 WILSHIRE BLVD., PH#8\nLOS ANGELES, CA 90036\nPh: (323) 933-9435\nFax (323) 939-9930\neMail: gwh225@aol.com\nVisit our Web Site: www.colonialstamps.com<|endoftext|>Conservation Subdivision Design: A Brief Overview\n\nby Randall Arendt, FRTPA, ASLA (Hon.)\n\nAn approach to laying out subdivisions so that a significant percentage of buildable uplands is permanently protected in such a manner as to create interconnected networks of conservation lands. The percentage of protected land varies according to project density, rising from 30-35% at density levels of three or more dwellings/acre, to 75-80% at four or more acres/dwelling.\n\nThis approach is distinct from earlier \"clustering\" and \"planned unit development\" (PUD) in terms of both the higher open space ratios and in terms of conscious design to forge community-wide networks of open space.\n\nThis is primarily a design approach for conserving existing natural and cultural resources, although a limited amount of active recreation is permissible (such as ballfields and neighborhood greens). Subdivisions where the majority of open space is taken up by a golf course do not meet this basic criterion.\n\nConservation subdivisions are generally \"density-neutral\", meaning that the overall number of dwellings built is not different from that done in conventional developments. Small density bonuses are sometimes granted in return for dedicating some or all of the conservation land for public access or use, for endowing permanent maintenance of the open space, or for providing workforce housing.\n\nConservation subdivisions are specifically designed around each site's most significant natural and cultural resources, with their open space networks being the first element to be \"green-lined\" in the design process. This open space includes all of the \"Primary Conservation Areas\" (inherently unbuildable wetlands, floodplains, and steep slopes), plus 30-80% of the remaining unconstrained land, depending upon zoning densities and infrastructure availability.\n\nThe site planning process begins with general mapping of the project site in its context of surrounding properties (up to 2000 feet away, typically mapped at 1\" = 400 feet). On this Location Map (compiled form existing published data) are shown vegetative cover, topography, soils, and floodplains. This initial map informs decisions regarding the design of the interconnected open space network.\n\nA more detailed, site-specific Existing Resources and Site Analysis Map is then created, identifying significant natural and cultural resource, such as productive cropland, wildlife habitat and travel corridors (meadows and forests, stream valleys), and significant trees, with size thresholds related to species: 4-6 inches for smaller species such as dogwood and redbud, 8-10 inches for medium species such as sassafras, cherry and water beech, 12-14 inches for slow growing hardwoods (oak, maple, ash), and 15-18 inches for fast growers (tulip poplar, sycamore, conifers). Historic or cultural resources such as farmhouses, barns, cellarholes, wells, stone walls, earthworks, trails/traces, and hedgerows are also identified, usually through GPS. (A photo essay illustrating such resources can be seen at http://www.terrain.org/articles/18/arendt.htm).\n\nA four-step process then ensues, Step One separating the site's resources into two categories. The first, Primary Conservation Areas (PCAs), are limited to inherently unbuildable wetlands, floodplains, and steep slopes (>25%). Secondary Conservation Areas are comprised of \"the best of the rest\". Because the PCAs would be off-limits to development in conventional developments in any event, they are not counted toward the minimum required open space percentages of conservation subdivisions. Therefore, 30-80% of the buildable land is usually designated as SCAs, depending on density (as noted above).\n\nStep Two consists of locating house sites in relation to the protected open space, to add livability, marketability, and value to the homes. The third step is to \"connect the dots\" with streets and trails. Step Four consists simply of drawing in the lot lines.\n\nThis process works best when guided by a landscape architect or physical planner, collaborating with a civil engineer. The creative skills of a landscape architect or physical planner are essential, balancing the technical training of engineers whose expertise lies principally in streets and drains.\nThe optimal design process begins with a site walk by the LA/planner and engineer, landowner, and developer, with the Existing Resources Site Analysis Map in hand, usually reproduced on an aerial photo at the working scale. The design is done in the field or immediately afterwards, on thin tracing paper so that the underlying resource information is visible to the designers, who typically work with pencil and eraser. (CAD technology is never used at this initial design stage, but is invaluable for later revisions.)\n\nThe resulting Sketch Plan is then shown to local officials, some of whom may have been invited to join the designers on their initial site walk. Officials who have not yet walked the property are strongly urged to do so during a subsequent site visit prior to voting on the Sketch Plan, whose merits (or lack thereof) will be come clear when examining the drawing while standing on the property and observing the terrain, landscape elements, cultural features, etc.\n\nAfter completing the above procedures, the time is right to prepare the highly detailed, expensive, Preliminary and Final Plans. Many municipalities inadvertently cripple their open space preservation efforts by skipping the critically-important Sketch Plan stage, and allowing (or requiring) applicants to submit highly detailed engineering documents at the so called \"Preliminary Plan\" stage. These cost so much to prepare that they lock applicants into whatever initial layout is prepared, usually with minimal previous consultation with staff or officials.\n\nThe above paragraphs summarize the key points relating to necessary improvements to most local subdivision ordinances.\n\nZoning ordinances work best when density is established directly (such as by designating density as three units per acre in sewered areas, or two acres per dwelling in unsewered areas) instead of indirectly (such as through minimum lot sizes, e.g. 12,000 sq. ft and 88,000 sq. ft). As long as density is regulated indirectly through lot size, subdivisions will consist of nothing more than houselots (of that size) and streets, with no open space.\n\nAfter separating the notions of lot size and density, treating them as independent variables, zoning works best when conservation design is designated as a by-right Permitted Use, making applications simple, straight-forward, and relatively easy. Conventional developments can be actively discouraged by re-classifying them as Conditional Uses. The condition to be met is a clear and compelling showing at a public hearing, convincing officials that dividing land into", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-home_and_hobbies", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-home_and_hobbies/part-00-00000.npy", "text": " trees. The main feature of the place\nmust evidently be the house, and therefore in devising prominent vistas and near or distant views we must take our stand at or not far from this point. Minor standpoints may of course be taken when some special effect is desired. Failure to contrive the landscape grouping from these established standpoints often weakens if it does not spoil lawn-planting, which is otherwise good and effective.\n\nThe curves of the walks or foot-paths are long and easy, reaching their destination in a natural and pleasing manner. All the junctions of paths and the main curves are planted with shrubbery in an irregular and informal manner. Furthermore, they are usually arranged with a view to suggesting the idea that the path is winding through single masses of flowers. It is not proposed in this plan to reserve any space for a vegetable garden, not only for want of room, but because it is notorious that vegetables thus grown are very expensive and troublesome. If exercise in gardening pursuits is desired, the same amount and a similar kind of work may be had in the culture of trees and shrubs as in that of vegetables with more generally satisfactory results. All necessary objects, not interesting in a picturesque way, such as drying-ground, entrance to the rear of buildings, tool-sheds, etc., should be shut out with deciduous shrubs. The front of these hedges or belts of shrubbery may be diversified by planting here and there occasional choice specimens.\n\nThe extreme end of the grounds may be also entered, if desired, by a path which should wind among shrubbery in somewhat obscure fashion, and come out suddenly on the lawn. The approach or entrance to the house is, in this case, somewhat formal and straight, for the sake of\nconvenience, which must at times overrule considerations of beauty. It is well planted with shrubbery, however, to relieve all stiffness and vary the straight line. This system also introduces the pleasant element of surprise, as the full effect of the lawn is only presented after the place has been fairly entered. Flowing, graceful lines, with one exception, are retained everywhere, especially in the vistas that extend off to the full depth of the lot. On the most extended side, the vista takes a slanting direction across a croquet-ground, reached by a winding path and fronted by a summer-house in the extreme corner. This simple, inexpensive rustic structure—shown in the lawn-planting study—looks out toward the house over the croquet-ground, down the most attractive vista of the place. About it should climb vines, honey-suckles, etc., and some flowering shrubs. The entire feature is finely crowned and perfected by associating with it a slender, drooping, cut-leaved birch, with tender gray or light-green foliage and gleaming white bark. It will thus form one of the corner posts, or prominent points that define the outline of the picture, and, at the same time, constitute a most interesting and picturesque termination for a walk. One such feature is almost enough for a small place. Architecture should be confined, as a rule, to the house structure, and the lawn devoted to plants. Even rockwork, except in peculiar spots, has hardly a place on any small lawn, for reasons that should be obvious. Whatever portion of the summer-house appears from among the vines and surrounding foliage is intended to show a rustic, graceful, and solid structure. Simple rustic seats may, of course, be erected in suitable positions, but should not be made architecturally prominent. As a rule, however, chairs\nmay be carried from the porch or veranda to any spot on so small a place. The planting on the walks directly fronting the summer-house should be made specially attractive by the employment of choice and dwarf trees and shrubs. The simple design of using a summer-house at all, has been to increase, within safe limits, the picturesque effect of the place, and to lend that portion of the scene a cozy, home-like aspect. Indeed, we have sought to give the entire place a similar natural appearance. Good lawn-planting should make it look, not as if it had been constructed in the ordinary sense of the term, but as if it had grown there, out of the special needs of the plants and of those expecting to enjoy them. Please note that we make most prominent the necessities of the plant. They must receive first attention, when the best effects will follow in due course. Landscape architects are, perhaps, liable to fall into the habit of regarding plants as they would bricks or stones. An edifice of landscape architecture cannot be erected exactly as one\nchooses. Plants have their freaks and peculiarities in different positions, which even practical experience can scarcely foresee.\n\nBeware of using on small places large-growing trees, and even on the outer boundary employ them sparsely. All such trees, like the Norway spruce or white pine, become in a few years, independent of their crowding mass, more or less unsightly for limited inclosures and necessarily close inspection. There should be an exact proportion between the size of a place and the eventual size—say in ten years—of all plants used for ornamenting it. For this reason, the rapid-growing, deciduous shrubs, with their wonderful variety of foliage and flowers and their moderate growth, are well adapted for small places. They not only attain moderate size, but can be duly restrained for many years by pruning. There are, also, many beautiful dwarf evergreen trees and shrubs well suited for lawn-planting on a small scale. Indeed, such plants may be kept, by pruning both root and branches intelligently, within a height of five feet for near a score of years.\n\nIt seems almost absurd to say that ornamental plants in their entire variety and special aptitudes for lawn-planting should be carefully studied by the lawn-planter. Nevertheless, many so-called experts seem to lose sight of the fact. With knowledge, however, and a cultivated taste, most delightful results can be obtained on a small lot by an outlay ranging from one hundred dollars to three hundred dollars, depending on the amount of choice plants used. Grading and fences are considerations governed by special conditions, and cannot, therefore, be taken into\na general and typical estimate. This hardly seems an extravagant sum to devote to the exterior adornment of a home that has probably cost at least $4,000 for the building, and $2,000 more for a simple and tasteful furnishing. The general impression is widely spread abroad that the accomplishment of artistic effects in lawn-planting on small places, if possible at all, must be expensive and elaborate. Perhaps the idea comes from the fact that our parks and grand show places afford almost the only instances of artistic lawn-planting, and they, of course, are expensive. The lawn-planting efforts, moreover, of the jobbing gardener or owner of the place, are generally crude and based on no settled principles of art. It is this, perhaps, that gains credence for the belief that landscape gardening, as a picturesque art, is not only expensive, but does not suit small places. People may not state such ideas definitely to themselves; but they clearly demonstrate, by practice, a conscious or unconscious belief in their truth.\n\nIt has been, therefore, our desire to enunciate a few simple and important considerations of an art too much neglected, and to exemplify them practically from a plan intended for execution in a simple and inexpensive manner. There are necessarily many features and details, not here treated, that may be introduced on small places with much effect and without transgressing any fundamental rules of lawn-planting. We desire, however, to utter, before concluding, yet another warning against attempting too much when once we assume the artistic standpoint. Care for the proper exhibition and health of the plants themselves must\nbe, after all, the prime consideration, in pursuance of which we cannot go far astray.\n\nAs I have already intimated, the rural adornment of the exterior of homes may rightfully demand and is receiving increased attention. It is improvement of taste in the same line, as that encouraged for the decoration of interiors, in that they both form important elements of home life. Unfortunately, many people have a way of regarding such work as requiring greater skill than is actually the case. It is really less difficult and expensive in proportion to the results obtained than most other forms of home art.\nCHAPTER XIV.\n\nCITY PARKS.\n\nO write of parks is to enter a field which is almost unlimited in extent. It has come now to the pass that every town and city of importance in Europe and America must have its park. It is the fashion. Whether the fashion is always well wrought out, is another thing. Unenlightened town authorities cannot always be depended on to employ competent talent, and to adopt a wise and comprehensive scheme of operations.\n\nYet, after all, parks are but larger door-yards or lawns,—or rather, in many cases, a series of them. The landscape-gardening lore applied to them is essentially the same as that employed in constructing the most modest home grounds. There is nothing really different in the general theory of the landscape gardening of parks from that of ordinary grounds. The apparent difference simply lies in the special application to some particular individual undertaking.\nIn actual practice, one park must, of course, be treated differently from other parks; but the lessons acquired by considering one piece of work of this kind, must always be helpful in carrying on other park-work.\n\nIn order, therefore, not to weary the reader with the enunciation of abstract principles, and detailing instructions that do not always really instruct, I am going to ask attention for a few moments to what I consider the best well advanced example of this kind of landscape gardening in America, namely, Central Park, New York City.\n\nIn considering Central Park, I beg leave to first introduce a few lines from the pen of Mr. Calvert V", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": "DF stretch back years, and primarily concern a contract involving EDF’s prepayment for uranium.\n\nIn July 2017, administrators from KPMG were appointed by Paladin’s board in order to undertake financial and operational assessments to assess the future options (if any) for Paladin Energy and its subsidiaries.\n\nPaladin’s shares were delisted from the Toronto Stock Exchange in August 2017, and trading in Paladin shares on the Australian Stock Exchange was suspended in June 2017. The company was restructured and relisted on the Australian Securities Exchange in February 2018 (and Paladin’s Canadian share sub-register was transferred to its Australian register). However, just three months later, LHM was put into care-and-maintenance. As discussed in the following chapter, the company's future is bleak.\n\nChapter Four: The Need to Fund and Plan for Rehabilitation of the Kayelekera Mine\n\n4.1 The Broader Context of Mine Rehabilitation Issues in Africa\n\nRehabilitation refers to the steps taken to repair the environment from damage and includes processes of decommissioning as well as ecological restitution. In terms of the process of assessing an abandoned or inactive mine site for the purpose of rehabilitation, it is imperative to address issues pertaining to the age of the mine site, the level of environmental impact presented by the site, health issues and public safety, social issues, availability of government support and the commitment of the community to rehabilitation.\n\nRehabilitation of mines has been problematic in various jurisdictions in Africa. Many of the legacy issues have occurred as a result of poor regulatory frameworks. An international comparative assessment of mine closure conducted by the University of Witwatersrand (Wits) Centre for Sustainability in Mining and Industry indicated that, despite challenges, South Africa was further advanced than most countries in the region in relation to addressing both environmental and social impacts of mine closure. South Africa has incorporated regulations regarding the financial capacity of entities to engage in mining operations under the National Environmental Management Act which include the life cycle of a mine, rehabilitation at closure and rehabilitation of latent or residual impacts that might arise long after mining has stopped.\nTo some extent in South Africa, and certainly elsewhere in Africa, weak regulatory frameworks allow investors to avoid rehabilitation of once operational mines, and mining companies may have an incentive to avoid decommissioning and rehabilitation due to the significant costs involved – a financial challenge that may be exacerbated by the cessation of the revenue stream from mining. \n\nIn Malawi, civil society groups have long fought for a strengthening of mining regulations, including regulations pertaining to mine-site rehabilitation. Funding for mine rehabilitation should be set aside before mining commences to ensure that funds will be available even in a worst-case scenario such as the mining company going bankrupt. The Chamber of Mines of South Africa, in a 2007 report on mine-site rehabilitation, stated: “Rehabilitation is an expensive business, which can account for as much as 10% of mining costs in certain circumstances. As the majority of these costs are usually incurred after mine closure, or at least after a significant portion of mining has been completed, some form of guarantee is usually required by authorities to ensure that these costs are met. In addition, there is now a requirement to provide financial assurance that the costs of rehabilitation will be met in the case of early or unplanned closure.”\n\n4.2 Prospects for the Kayelekera Mine\n\nPaladin claims that it hopes to restart the Kayelekera mine at some unspecified future date but the likelihood of a restart is minimal and receding.\n\nPaladin states: “It is expected that the mining and milling operation will be quickly and effectively re-started when market conditions make it attractive to do so.” Such statements ignore obvious problems such as the time and expense involved in establishing a workforce to operate the mine. There are two further sets of problems, discussed below. Firstly, Paladin has been put into administration once already, and the company’s future prospects are bleak following the May 2018 decision to put LHM into care-and-maintenance. Secondly, the uranium market is in a protracted slump and expert opinion is increasingly leaning towards the view that the slump will persist well into the 2020s.\n\n4.3 Paladin’s Bleak Future\n\nPaladin’s two uranium mines in Africa are both in care-and-maintenance. Paladin also owns various ‘nonproducing assets’ in Australia, Canada and Niger. In 2016, Paladin sold a number of Australian uranium exploration projects to Uranium Africa for just A$2.5 million, including Oobagooma in Western Australia and the Angela/Pamela and Bigryli projects in the Northern Territory. Also in 2016, Paladin sold its 257.5 million shares in uranium exploration company Deep Yellow for A$2.6 million, with shares priced at one Australian cent per share.\n\nPaladin has tried but failed to sell other ‘nonproducing assets’ such as its 30% stake in the Manyingee uranium project in Western Australia. Development of Manyingee (and all other non-approved deposits) is prohibited under the policy of the current Western Australian government.\n\nLikewise, Paladin has a stake in two undeveloped uranium projects in Queensland – Mount Isa North Project and the Valhalla North Project – but the development of those mines is prohibited.\nunder the policy of the current Queensland government. In 2015, Paladin booked a A$323.6 million write-down on its exploration assets in Queensland.\\(^\\text{103}\\)\n\nPaladin’s share price went from one Australian cent in 2003 to A$10.80 in 2007, but fell more than 200-fold and traded at 4.7 cents before trading was suspended in June 2017.\\(^\\text{104}\\) (Trading resumed in February 2018 – the share price was 18 Australian cents as of 13 June 2018.) The company was delisted from the Toronto Stock Exchange in August 2017 due to its failure to meet the exchange’s requirements for continued listing.\\(^\\text{105}\\) Paladin’s losses totalled US$1.9 billion between 1994 and 2014.\\(^\\text{106}\\)\n\nThe company’s prospects appear to be very bleak. It is poorly placed to be sitting on dormant mines in Africa – and other nonproducing assets – for years to come in the hope of a uranium market revival.\n\n4.4 The Uranium Market\n\n\"It has never been a worse time for uranium miners.\" – Alexander Molyneux, CEO of Paladin Energy, October 2016.\\(^\\text{107}\\)\n\nPaladin has said that a price of about US$75 per pound of uranium oxide would be required for Kayelekera to become economically viable.\\(^\\text{108}\\) In Paladin’s words, the company would \"not contemplate any such an expansion until uranium prices reach at least US$75/lb and are sustainable at or above this level.\"\\(^\\text{109}\\)\n\nUS$75/lb is far higher than the prevailing prices as of 31 May 2018: US$22.73 spot price and US$29.00 long-term contract price.\\(^\\text{110}\\) The spot price hasn’t reached US$75 since early 2008 – the tail-end of a price bubble.\\(^\\text{111}\\) The long-term price hasn’t reached US$75 since September 2008 – also the tail-end of a price bubble.\\(^\\text{112}\\)\n\nPaladin also said that the availability of grid power supply would be necessary to restart Kayelekera, to replace the existing diesel generators which are expensive to run.\\(^\\text{113}\\)\n\nEven if the uranium price did rebound and the mining resumed, Kayelekera would operate for only 3–5 years according to a 2014 Paladin document\\(^\\text{114}\\) – it isn’t a large uranium deposit.\n\nOf course, it is possible that uranium prices could rise such that Kayelekera could be restarted and operate profitably. However the likelihood of that scenario eventuating in the foreseeable future is remote. Numerous nuclear and uranium industry insiders, along with uranium market analysts, anticipate depressed prices for many years ahead. For example:\n\n- Then Paladin Energy chief executive John Borshoff said in 2013 that the uranium industry \"is definitely in crisis ... and is showing all the symptoms of a mid-term paralysis\".\\(^\\text{115}\\)\n- Former World Nuclear Association executive Steve Kidd said in May 2014 that \"the case made by the uranium bulls is in reality full of holes\" and he predicted \"a long period of relatively low prices, in which uranium producers will find it hard to make a living\".\\(^\\text{116}\\)\n- An October 2015 report in Nuclear Engineering International noted that \"there may not be much upward pressure on market prices until the next decade\" as \"excess supply is expected to persist.\"\\(^\\text{117}\\)\n- Nick Carter from Ux Consulting said in April 2016 that the spot uranium price could stay in the low $30s/lb \"for quite some time\" because supply is expected to exceed demand by 25–30\nmillion pounds U3O8 each year from 2016 to 2019, and he does not anticipate a supply deficit in the market until \"the late 2020s\".118\n\n- The Wall Street Journal reported in September 201", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": ". It is shown in the examples of the patent in suit that the heat treated granules have a level of fines, measured by the ball mill test, which is from about 5 times to about 25 times lower than that of the starting compacted granules, depending on the heat treatment time. The appellant argued in the grounds of appeal that the value of 4.9% obtained by the ball mill test for the starting granules equated to an unacceptable value of above 15% fines after pneumatic transport. Although the level of fines of the heat treated granules after pneumatic transport is not given in the examples, it is plausible in view of the considerable reduction of the fines level obtained by the ball mill test that the level of fines after pneumatic transport has been reduced to an acceptable level.\n\nAt the oral proceedings the respondent expressed doubts that the technical problem was solved by the claimed process. He argued that the value of 4.9% obtained in\nthe ball mill test was meaningless since the amount of fines (<200 µm) of the starting compacted granules had not been measured. This argument is not convincing in view of the explanation on page 3 (lines 47 to 55) of the patent in suit as to how the ball mill friability was determined. As the sample of granules was sieved to remove oversize (>1200 µm) and undersize (<200 µm) before introduction into the ball mill, the percentage of fines formed during milling for 5 minutes can be determined by simple sieving. Knowledge of the amount of fines <200 µm before the test is not necessary since the fines were removed from the product before its introduction into the ball mill.\n\nThe respondent objected for the first time at the oral proceedings that the fine level above 15% after pneumatic transport was not stated in the patent in suit, thus implicitly questioning its correctness. However he provided no evidence that this value was incorrect. It is true that the patent in suit does not contain any value about the level of fines after pneumatic transport. However, European patent specification EP-B-0 471 049 which is from the same patentee as the patent in suit and has the same filing and priority dates, also concerns the treatment of compacted sodium silicate granules with the view to reducing their attrition loss during pneumatic transport. This patent specification, which was known to the respondent as he confirmed at the oral proceedings, discloses in Table II both the fine level obtained by the ball mill test and the fine level after pneumatic transport. According to Table II and Example 2, the starting compacted sodium silicate granules were obtained from Crosfield Chemicals Eisden Netherlands. They had a particle size similar to the\nclaimed one and a water content falling within the claimed range. The level of fines determined by the ball mill test was 0.8% below 125 µm and the level of fines after pneumatic transport was 11% below 180 µm. In the patent in suit, the compacted sodium silicate granules used as the starting product in the examples also come from Crosfield Chemicals Eisden Netherlands and the ball mill test gives a level of fines below 200 µm of 4.9%. In view of the level of fines disclosed in EP-B-0 471 049 for both the ball mill test and the pneumatic transport, the board considers it plausible that the value of 4.9% fines < 200 µm in the ball mill test of the patent in suit equated to a level of fines of above 15% during pneumatic transport. Therefore, in the absence of evidence to the contrary, the board sees no reason not to accept the appellant's arguments already presented in the grounds of appeal and not contested by the respondent until the oral proceedings.\n\nThe respondent's line of arguments that an improvement of the attrition resistance was not obtained with all kinds of compacted sodium silicate falling within the definition of claim 1, in particular with those compacted sodium silicate granules whose manufacture included the optional heat treatment before granulation disclosed in D4, cannot be accepted by the board for the following reasons. The respondent's affirmation that with these compacted granules the problem of attrition during pneumatic transport does not arise and thus no improvement of the attrition can be achieved, is not supported by any evidence, although the burden of proof rests on the respondent in this respect. Taking into account that the heat treatment before granulation disclosed in D4 is not performed in an agitated bed, that it is applied to a sheet or flakes,\nie to a product which is very different from the granulated product, and that the heated product is then crushed in a mill, it is not credible, in the absence of evidence, that this heat treatment would have the same effect on attrition as the claimed heat treatment and that the problem of attrition loss does not exist with those starting compacted granules. Concerning the starting granules used in the examples of the patent in suit, the board sees no reason not to accept the respondent's arguments that the compacted sodium silicate granules from Crosfield Chemicals of Eijsden Netherlands were obtained by compacting the feedstock between rollers since this is in agreement with the disclosure of the patent in suit, page 2, second paragraph, and with claim 1. As pointed out by the respondent at the oral proceedings, it appears that the properties of the starting compacted granules depend on certain parameters such as the compaction pressure, the thickness of the sheet or the water content of the spray-dried powder. However, it cannot be deduced therefrom that a reduction of the attrition loss would not be obtained with all kinds of compacted granules falling within the definition given in claim 1. The respondent has provided no evidence in support of his affirmation that the claimed heat treatment would not lead to an improvement of the attrition resistance for all kinds of compacted granules prepared as stated in claim 1, although the burden of proof lies on him. In the absence of such evidence and considering, on the other hand, that the examples of the patent in suit show a reduction of attrition loss resulting from the claimed heat treatment, the board cannot conclude that the technical problem is not solved over the whole breadth of claim 1.\nFor the preceding reasons the board considers it credible, in the absence of evidence to the contrary, that the technical problem has actually been solved by the claimed process.\n\n5. The respondent's arguments that the teaching of D4 would have rendered the claimed solution obvious to the skilled person (see point VI above) are not convincing. The board observes that neither D4 nor D5 deals with the problem of attrition of the compacted granules prepared by the process disclosed therein, let alone with the attrition loss during pneumatic transport. These documents also do not disclose a heat treatment of the compacted granules. In the process of production of compacted alkali silicates according to D4, the compacted sheet is aged for 5 to 15 minutes before the granulation step. During this aging step the compacted material, either in the form of whole sheets or of flakes, can be subjected to heating and/ or cooling. During the aging step the compacted material is for example heated to a temperature of 65°C to 200°C for 3-8 minutes and then cooled to below 21°C in 1 to 10 minutes. Then the compacted material is granulated by crushing in various types of mills and the resulting granules are screened (see claims 1 and 6; column 1, lines 44 to 57; column 3, lines 19 to 39). The appellant's argument that the skilled person would have contemplated performing the heat treatment before instead of after the granulation step because D4 taught that this heat treatment resulted in improved properties of the granules cannot be accepted since D4 does not disclose an improvement of properties due to the said heat treatment. According to D4 the advantage obtained by heating the sheet or flakes after compaction is that the time needed for aging before\ngranulation is reduced: see column 3, lines 62 to 64. This effect which is in no way related to the attrition properties cannot suggest to the skilled person that performing a heat treatment of the compacted granules, ie a heat treatment after instead of before granulation, would have improved the attrition resistance during pneumatic transport. D5 which mentions no heat treatment and does not deal with the problem of attrition of the compacted granules likewise cannot point towards the claimed solution.\n\n6. In the process for producing sodium polysilicate disclosed in D2, the spray-dried hollow microspheres are fractured and pulverized in the milling apparatus (9) in order to increase their bulk density and the pulverized particles are then passed into the rotary dryer (10) which serves to reduce the surface irregularities of the fractured particles and to form a product having continuously even surfaces. The temperature of the fractured particles in the rotary drum is preferably in the range of from 70 to 140°C. According to D2, at a temperature of about 70°C or higher the particles become somewhat plastic in nature. This characteristic is preferable in obtaining the desired reduction of the surface irregularities of the particles, ie obtaining a product having continuously even surfaces. It is further disclosed in Example 1 that the tumbling action of the rotary dryer has the effect of rounding off the sharp edges of the fractured particles so that the particles have continuously even surfaces (see claim 1, column 4, lines 45 to 70; column 7, lines 33 to 39; Figure 3). The heat", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " concrete be evaluated to determine ASR potential and an effective mitigation. EM 1110-2-2000, provides recommendations for evaluating and mitigating ASR in concrete mixtures. Aggregate evaluations may not be\n\nSECTION 03 37 23 Page 23\npractical for projects requiring small quantities of concrete (less than 200 cubic meters 250 cubic yards).\n\nSection 32 13 14.13 CONCRETE PAVING FOR AIRFIELDS AND OTHER HEAVY DUTY PAVEMENTS, paragraph 2.3.1.2 Alkali-Silica Reactivity, provides a specification method for the Contractor to evaluate and mitigate ASR in concrete mixtures. The expansion limits specified in Section 32 13 14.13 are requirements for pavements and exterior slab construction. For structural concrete applications the measured expansion shall be less than 0.10 percent. It may not be economical or practical to specify different test limit requirements for use on the same project. In which case the lower limit required by the application should be used.\n\nThe designer may use the specification method in Section 32 13 14.13 by incorporating the relevant paragraphs into this specification, or may use the following requirements (retain either the 0.10 or the 0.08 percent expansion limits as appropriate). included in the set of brackets highlighted thus \"[ ]\".\n\n**************************************************************************\n\n2.2.4.1 Composition\n\n[Fine aggregate shall consist of natural sand, manufactured sand, or a combination of natural and manufactured sands. Coarse aggregate shall consist of [gravel], [crushed gravel], [crushed stone], [air-cooled blast-furnace slag], or a combination thereof.] \"[Fine and coarse aggregates proposed for use in concrete shall be tested and evaluated for alkali-aggregate reactivity in accordance with ASTM C1260. The fine and coarse aggregates shall be evaluated separately and in combination, which matches the Contractor's proposed mix design proportioning. All results of the separate and combination testing shall have a measured expansion less than 0.10 (0.08) percent at 16 days after casting. Should the test data indicate an expansion of 0.10 (0.08) percent or greater, the aggregate(s) shall be rejected or additional testing using ASTM C1260 and ASTM C1567 shall be performed. The additional testing using ASTM C1260 and ASTM C1567 shall be performed using the low alkali portland cement in combination with ground granulated blast furnace (GGBF) slag, or Class F fly ash. GGBF slag shall be used in the range of 40 to 50 percent of the total cementitious material by mass. Class F fly ash shall be used in the range of 25 to 40 percent of the total cementitious material by mass.]\n\n2.2.4.2 Quality\n\n**************************************************************************\n\nNOTE: The tests selected should be those which are applicable to the concrete to be used in the project. These tests may include those listed below in addition to others not listed. See EM 1110-2-2000 for schedule of tests.\n\nOnly a limited number of laboratories are now running ASTM C123/C123M due to the toxic chemicals.\nrequired. Recommend that ASTM C295/C295M/C295M be specified.\n\nA list of properties and test values are unique to each project and should be taken from the concrete materials DM. Delete the quality tests not required in the DM.\n\nThe petrographic examination shall be used to identify deleterious substances in aggregates. Deleterious substances shall be listed individually with respective limits.\n\n**************************************************************************\n\nAggregates delivered to the mixer shall meet the following requirements:\n\n
\n\n
\n
PROPERTY
\n
FINE AGGREGATE
\n
COARSE AGGREGATE
\n
TESTS
\n
\n\n\n
\n
Specific Gravity
\n
[_____]
\n
[_____]
\n
ASTM C127
\n
\n
\n
\n
\n
\n
ASTM C128
\n
\n
\n
Absorption
\n
[_____]
\n
[_____]
\n
ASTM C127
\n
\n
\n
\n
\n
\n
ASTM C128
\n
\n
\n
Flat and Elongate
\n
[_____]
\n
25 percent max.
\n
ASTM D4791
\n
\n
\n
Durability Factor using Procedure A
\n
[_____]
\n
[_____]
\n
COE CRD-C 114
\n
\n
\n
\n
\n
\n
ASTM C666/C666M
\n
\n
\n
Clay Lumps and Friable Particles
\n
[_____]
\n
[_____]
\n
ASTM C142/C142M
\n
\n
\n
Material Finer than 75 µm No. 200 Sieve
\n
[_____]
\n
[_____]
\n
ASTM C117
\n
\n
\n
Liquid Limit and Plastic Limit on material passing the 75 µm No. 200 sieve size
\n
LL 30 max.,
\n
[_____]
\n
ASTM D4318
\n
\n
\n
\n
PI 10 max.
\n
\n
\n
\n
\n
Organic Impurities
\n
Not Darker than No. 3, Not less than 95 percent
\n
[_____]
\n
ASTM C40/C40M
\n
\n
\n
\n
\n
\n
ASTM C87/C87M
\n
\n
\n
L.A. Abrasion
\n
[_____]
\n
[_____]
\n
ASTM C131/C131M
\n
\n
\n
\n
\n
\n
ASTM C535
\n
\n
\n
Soft Particles
\n
[_____]
\n
[_____]
\n
COE CRD-C 130
\n
\n\n
\n### TEST LIMITS\n\n
\n\n
\n
PROPERTY
\n
FINE AGGREGATE
\n
COARSE AGGREGATE
\n
TESTS
\n
\n\n\n
\n
Petrographic Examination
\n
List unwanted deleterious materials and their limits
\n
[_____]
\n
ASTM C295/C295M
\n
\n
\n
Percent coarse aggregate with 2 or more fractured faces
\n
[_____]
\n
20 percent min.
\n
[_____]
\n
\n
\n
Chert, less than 2.40 specific gravity
\n
[_____]
\n
[_____]
\n
ASTM C123/C123M or ASTM C295/C295M
\n
\n
\n
[Coal and Lignite, less than 2.00 specific gravity]
\n
[_____]
\n
[_____]
\n
ASTM C123/C123M or ASTM C295/C295M
\n
\n\n
\n\n#### 2.2.4.3 Grading\n\n**NOTE:** See DM for appropriate fine aggregate options.\n\n---\n\n**a.** Fine Aggregate - The grading of the fine aggregate as delivered to the mixer for the RCC shall be such that the individual percent retained on any sieve shall not vary more than 3 percent from the percent retained on that sieve in a fixed grading selected by the Contractor after the first 30 days of concrete placement. The minimum percent retained on each of the 2.36 mm No. 8 through 75 µm No. 200 sieve sizes shall be 5 percent. In addition to the grading limits, the fine aggregate, as delivered to the mixer, shall have a fineness modulus of not less than 2.10 nor more than 2.75. The grading of the fine aggregate shall also be controlled so that the fineness moduli for at least four of five consecutive test samples of the fine aggregate as delivered to the mixer shall not vary more than 0.10 from the fineness modulus of the fixed grading selected by the Contractor, and approved. The fineness modulus shall be determined in accordance with COE CRD-C 104. At the option of the Contractor, fine aggregate may be separated into two or more sizes or classifications, but the uniformity of the grading of the separate sizes shall be controlled so that they may be", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " Jackson and Williams 1979, Mohlin 1989, Corson and Lee 1990).\n\nThe concept with combined rejects and second stage main line refining that was performed with LC refiners...\nin the early Bauer RMP installations, was also applied in HC refiner lines supplied by Sprout Waldron (Jones 1968, Ulander 1985, Fjerdingen et al. 1997). The main line consisted of two or three refiners in series and the screen rejects were introduced before the second refining stage, Figure 16. This process concept however is no longer in widespread use.\n\nFor printing paper, the most common rejects treatment today is single stage HC refining. Other approaches include two stage HC refining (Viljakainen et al. 1997, Amiri et al. 2016, Sandberg et al. 2017a) and a combination of HC and LC refining. The combination of HC and LC refining of rejects has been shown to improve pulp properties and efficiency (tensile index – specific energy) (Lansford 1979, Sandberg et al. 2017a). Viljakainen et al. (1997) evaluated LC-HC refining on rejects, but found no positive effects of the combined LC and HC refining. However, the applied specific energy in that LC refiner was low compared to the specific energy reported by Sandberg et al. (2017a).\n\nHC-LC refining of rejects was also applied in some groundwood mills (e.g. Witherell 1968, Ferritsius and Ferritsius 1997).\n\nAs mentioned above, LC refining of rejects was common in the early RMP lines. Nowadays, this is rare and for printing paper, the TMP mill in Skogn, Norway, is the only mill in operation, to our knowledge, that utilises LC refiners for rejects refining (Imppola et al. 2013). However, in the Skogn mill, LC refining is carried out on mixed main line pulp and rejects. In Braviken, the same concept has been introduced recently, but the screen accepts are further fractionated in hydrocyclones with the rejects being refined in HC refiners.\n\nIn contrast to the established idea of mechanical pulping processes containing rejects separation and refining, Ferritsius et al. (2014) showed, based on thorough pulp quality comparisons of a large number of TMP lines, that the same pulp quality can be reached after single stage high intensity main line refining as final pulp from a TMP line with two stage SD refining, screening and rejects refining. Sandberg et al. (2017b) produced paper on a high-speed paper machine with a high efficiency TMP process without any fractionation. The produced paper performed even better in printing than the normal newsprint produced with a conventional SD TMP process.\n\n**Post refining**\n\nPost refining of groundwood pulp with pump through refiners was introduced during the 1960’s, mainly as a final adjustment of paper quality. An applied specific energy of 40 kWh/t gave a reduction in shives content of 50 % and increased burst and surface smoothness by 10–20 % (Richardson 1969, Kurdin 1974). Post refining was also a low-cost alternative to increase groundwood production (Hoholik 1958). It was also used to upgrade a newsprint furnish to higher quality grades (Brandal and Hauan 1970). Kilpper and Baumgartner (1977) showed in pilot scale that it was better to only post refine the longest fibres.\n\nIn some mills, news grade pulp is upgraded to lightweight coated (LWC) and super calandered (SC) quality by HC post-refining and peroxide bleaching (e.g. Asplund et al. 2009).\n\n**Process design approaches**\n\nSome process concepts can be distinguished from the most common process design shown in Figure 2. We have tried to group these designs according to, in our judgement, an intention or approach in the choice of process configuration. This is our subjective classification, and another grouping might of course be possible.\n\n**Main line approach**\n\nOne idea is that the most economical process with good fibre development is attained by doing as much of the fibre development as possible in the main line refining and only having a low reject rate with LC refining on the reject. Such a process, with three CD82 HC refiners in series, was in operation for several years in the Port Hawkesbury Mill, Canada, Figure 17, (Mokvist et al. 2005). Nowadays, the mill has a more advanced two stage HC reject refining\nFractionation approach\n\nMuch research has been made on concepts where the refining is separated into a primary refining, after which the pulp is fractionated into a coarser fraction sent to further refining and a finer fraction that is fed directly to dewatering. Such a process concept was first suggested for refiner processes by Luhde (1966). However, it was used even earlier in groundwood production where a coarse groundwood pulp was produced, coarse-screened and fractionated using a vibrating screen, Figure 19. The screen rejects (roughly 50% of the bull screen accepts) were refined in three DD refiners (Hoholik 1958). The refined rejects were combined with the vibrating screen accepts and fed to the fine screens. The fine screen rejects were fed back to the vibrating screen feed.\n\nThe refining process is strongly heterogenic (Reyier Österling 2015), and the thought has been that it ought to be more energy efficient to do limited initial refining and separate the poorly developed fibres for additional refining (Gavelin 1966, St. Laurent et al. 1993, Corson et al. 1995). One major problem with this idea is how to achieve the fibre fractionation with high efficiency. Screens have a low ability to separate fibres with regard to fibrillation and bonding ability but can to some extent separate fibres according to coarseness (Ämmälä 2001). Hydrocyclones have higher separation efficiency, but they suffer from the large disadvantage that very low consistency is needed to achieve good fractionation and thereby much larger disc filter capacity is required. (Karnis 1982, Mohlin 1989, Sandberg et al. 1997, Kure et al. 1999, Wakelin et al. 1999, Sandberg et al. 2001, Ouellet et al. 2003).\n\nOne extreme example of this approach is the Noss Advanced Mechanical Pulping Process (NAMP), Figure 20, which was developed to maximize fractionation efficiency and optimize the refining conditions for different fibre fractions (Shagaev and Bergström 2005). The concept utilizes LC refining on the intermediate hydrocyclone fraction (enriched in transition wood fibres) which can withstand a high load in LC refining, whereas late wood fibres (third stage hydrocyclone rejects) and screen rejects are refined at HC. The process has been evaluated in mill scale, (Sandberg and Shagaev 2011) but is not in continuous operation.\n\nDefibration/fibrillation approach\n\nAnother approach is the idea of performing defibration and fibrillation in separate machines using different conditions, as mentioned in the “Main line refining” section above. This concept was proposed by Neill and Beath (1963). Based on similar ideas, Valmet developed the Thermopulp process (Höglund et al. 1997) and later, Andritz developed the ATMP process, Figure 4, in cooperation with Norske Skog (Sabourin et al. 2003, Hill et al. 2009). The Thermopulp concept was difficult to run due to low disc gap in the second stage refiner operating at 7–8 bar pressure (authors experience from the Braviken mill) and there are unfortunately no reports, so far, from the only mill installation of a full ATMP process. However, the concept of separating the defibration and fibre development seems to be a good way to further reduce the specific refining energy. More mill experiences are however needed in this area.\nSystem simplification approach\n\nReducing process complexity has, in some cases, represented a driving force for system development, motivated by reduced capital cost and easier process control (e.g. Ulander 1985). Some TMP and CTMP lines were built with the process configuration outlined in Figure 21. (Jussila et al. 1999). It is a simplified process with low capital cost since there is no separate rejects screening or rejects latency chest. Even though this process is compact, it is not easy to have an on-line pulp quality control of the two HC refiners.\n\nThe TMP process utilized in Skogn, Figure 18, is also an example of a design that simplifies the process. Sandberg et al. (2018a) have shown that it is preferable to utilize high intensity refining, such as DD or RTS, for this process concept. A process incorporating single stage HC refining and LC refining of primary stage pulp and screen rejects, Figure 22, reduces system complexity and refining energy as well as improves process control. Such a process was evaluated by Strand et al. (1993) and by Sandberg et al. (2018a), the latter involved single stage HC", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": ", 06.28.11)\n\nSection R109.1.5.1 EIFS Inspections Required. (R109.1.6.1 through P3002.2.3. were added by Ordinance 15-031, 05.26.15) A special inspection by the manufacturer's representative or other qualified 3rd party inspector is required for all EIFS installations. Inspections are required at the rough and final stages of installation. Reports must be submitted to the Building Division for approval prior to issuing an occupancy permit or certificate of completion.\n\nSection R109.1.6.1 Failure to Schedule Final Inspection. If a contractor and/or applicant fails to schedule a final inspection within 12 months of receiving a building permit, or within 30 days of job completion whichever is less, the contractor is subject to fines of up to $1000 and revocation of contractor's registration. (Ordinance 15-031, 05.26.16)\n\nSection R112 Appeals Board. Delete the section in its entirety.\n\nTable R301.2(1) Climatic and Geographic Design Criteria.\n\n
\n\n
\n
Criteria
\n
Value
\n
\n\n\n
\n
Roof Snow Load
\n
30 pounds per square foot
\n
\n
\n
Wind Speed
\n
90 miles per hour
\n
\n
\n
Seismic Condition by Zone
\n
B
\n
\n
\n
Subject to Damage from Weathering
\n
Severe
\n
\n
\n
Frost Line Depth
\n
42 inches
\n
\n
\n
Termite
\n
Moderate to Heavy
\n
\n
\n
Winter Design Temperature
\n
(-4 degrees)
\n
\n
\n
Ice Barrier
\n
Required
\n
\n
\n
Flood Hazard
\n
Chapter 33 of Bolingbrook Municipal Code
\n
\n
\n
Air Freezing Index
\n
1700
\n
\n
\n
Mean Annual Temp
\n
50 degrees
\n
\n\n
\n\nSection R305.2 Basement Ceiling Height. The minimum height measured from the surface of the basement floor to the lowest part of the floor joists above shall be (8'8\") eight feet eight inches. The minimum height measured from the surface of the basement floor to the bottom of the lowest beam, girder or structural support shall be (7'8\") seven feet eight inches. Exception: House designs where it is structurally infeasible as determined by the Building Commissioner, and/or locations where groundwater and soil conditions pose a significant risk of basement flooding, as determined by the Village of Bolingbrook.\n\nSection R308.4 (5.1) Glazing, Hazardous Locations. Glazing must be safety or tempered glass or approved equivalent if any portion is located within 42 inches of the plumbing fixtures and areas identified in section R308.4 (5).\n\nSection R309.2.1 Garage Separation. Attached garages shall be separated from the dwelling and attic areas by not less than 5/8 inch Type X gypsum board applied to the garage side of all walls and ceilings. Attic openings within the garage shall have panels of 5/8 inch Type X drywall or ¾ inch fire retardant treated plywood resting on a 1 x 4 or greater ledger nailed vertically into the framing. Panels are to be screwed in place or latched to prevent them from rising with heat in case of fire.\n\nSection: R309.7 Gas curb. A minimum four-inch (4\") gas curb shall be provided in and around the entire garage floor area in all attached garages. The garage floor pitch from back to front must not be less than .02 percent (.02%).\nSection R309.8 Residential Garages, Interior Finishes. All interior walls and ceilings of garages in newly constructed single family and attached single family homes shall be finished with 5/8\" Type X drywall, then taped, sanded and painted. The workmanship and quality of the finish shall be comparable to the interior walls of the home. (Ordinance 04-106, 08.24.04)\n\nSection R310.1 Emergency escape windows. Change the first two (2) lines to read as follows; Emergency Escape and Rescue required. All basements and every sleeping room shall have at least one operable emergency escape and rescue opening. Basement egress windows must meet the requirements of section R310.1.4 of the 2006 IRC. The required opening size must be obtained by normal operation of the window.\n\nSection R310.1.5 Basement Escape Window Location. Emergency escape windows in basements shall be located on a side elevation of a single family dwelling to prevent being covered by decks or other attached structures, unless otherwise approved by the Building Commissioner his/her designee.\n\nSection R310.2.2 Window Well Covers. Window wells with a horizontal projection of more than twenty-four inches (24\") shall be provided with covers that allow for the transmission of daylight and protect children from falling into the window well. These covers shall comply with Section R310.4 of the 2006 International Residential Code. (Ordinance 05-010, 01.25.05)\n\nSection R312.2 Guard Opening Limitations: Add the following language; Required guards shall not be constructed with horizontal rails or balusters that result in an ornamental design creating a ladder effect.\n\nSection R317.1 Separations In Two-Family Dwellings. Dwelling units in two-family dwellings shall be separated from each other by a masonry or concrete wall carrying a fire rating of not less than two (2) hours. Separation walls shall be continuous from the floor slab to the underside of the roof deck. The roof sheathing on each side of the wall shall be fire-retardant treated and shall extend from the wall to a point of least four feet (4’) away from the wall.\n\nSection R317.2 Townhouses. Townhouses shall include as examples the following, but shall not be limited thereto: condominiums, attached single-family, townhouses, row houses, and any townhouse style construction.\n\nSection R317.2.1 Fire walls. A firewall shall be provided continuously from the foundation to its termination at the underside of the roof deck of combustible roof decks in Type 3, 4, and 5 construction where all of the following conditions are met: (Ordinance 92-021, 03.10.92)\n\na. The wall is properly firestopped at the deck.\nb. The roof sheathing or deck is constructed of approved non-combustible materials or of fire-retardant treated wood, for a distance of four (4) feet on both sides of the wall.\nc. Combustible material does not extend through the wall.\nd. The roof covering has a minimum of a Class C rating.\ne. The firewall shall be constructed of masonry or concrete and must be self-sustaining. (Ordinance 92-035; 04.14.92)\n\nSection R317.2.1.1 Assemblies. There shall be provided two (2) hour fire resistive walls to be of masonry or concrete construction and free to all combustible materials without openings between all dwelling units, between dwelling units and the common areas within a building, between all guest rooms, between guest rooms and the common areas within a building. When\npenetrations are absolutely necessary, the penetrated areas must be sealed in such a manner that the required rating will be maintained. Corridors constructed with one layer of drywall on each side of each corridor wall shall be considered in compliance with this requirement. (Ordinance 87-040, 05.27.87)\n\nSection R325 Gutters. Gutters and downspouts shall be installed on all habitable dwellings with basements and/or crawlspaces.\n\nSection R401.5 Sill plate gaps. Gaps between sill plates and foundations shall be sealed with mortar or a similar approved material.\n\nSection R 402 Materials. Delete Sections R402.1 and 402.1.2.\n\nSection R403.1.1 Footings. Shall be changed to the following: The minimum dimensions for spread footings shall be eight inches (8\") deep and eighteen inches (18\") wide, except that masonry veneer on frame walls placed on concrete foundations shall be supported by spread footings with minimum dimensions of ten inches (10\") deep and twenty inches (20\") wide. These dimensions are based on a soil bearing capacity of 3,000 pounds per square foot. Soils with a lesser bearing capacity or where unusual loading conditions exist, larger footings or reinforcement may be required. The design must be provided by an Illinois licensed architect or an Illinois licensed structural engineer.\n\nSection R403.1.1.1 Keyway. A two-inch (2\") by two-inch (2\") keyway must be provided in the top of the footing underneath the centerline of the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " compensation for such extra work will be allowed unless such report shall have been made.\nThe above-described methods of determining the payment for work and materials shall not apply to the performance of any work or the furnishing of any material, which, in the judgment of the Engineer administering the Contract, may properly be classified under items for which prices are established in the Contract.\n\nD. Claims for Extra Work\n\nIf the Contractor claims that any instructions by drawings or otherwise, involve extra cost under this Contract, he/she shall give the City of Tacoma written notice thereof within 30 days after receipt of such instruction, and in any event before proceeding to execute the work, except in an emergency endangering life or property, and the procedures governing the same shall be as provided for immediately above in this paragraph. The method in these paragraphs is the only method available to the Contractor for payment of claims for extra work performed under the terms of this Contract.\n\n3.11 CLEANING UP\n\nThe Contractor shall at all times, at his/her own expense, keep the premises free from accumulation of waste materials or debris caused by any workers or the work, at the completion of the work the Contractor shall remove all his waste materials from and about the site and all his/her equipment, sanitary facilities and surplus materials. In the case of dispute, the City of Tacoma may remove the debris and charge the cost to the Contractor as the City of Tacoma shall determine to be just. All material that is deposited or placed elsewhere than in places designated or approved by the Engineer administering the Contract will not be paid for and the Contractor may be required to remove such material and deposit or place it where directed.\n\n3.12 PROGRESS PAYMENT\n\nProgress payments will be made up to the amount of ninety-five percent (95%) of the actual work completed as shall be determined by the Engineer administering the Contract.\n\nThe Contractor may request that an escrow account be established as permitted by law, in which event the Contractor will earn interest on the retained funds.\n\nWhen the time for construction, services and/or installation will exceed thirty (30) days, the Contractor may request, by invoice, to be paid a progress payment based on percentage of work completed. The Engineer will review and approve the progress payment request on a monthly basis.\n\n3.13 FINAL PAYMENT\n\nThe final payment of five percent (5%) of the Contract price shall be approved on final acceptance of the work under this Contract by the Superintendent or his/her designee. In addition, before final payment is made, the Contractor shall be required to:\n\nA. Provide a certificate from the Washington State Department of Revenue that all taxes due from the Contractor have been paid or are collectible in accordance with the provisions of Chapter 60.28 and Title 82 of the Revised Code of Washington;\n\nB. Provide the General Release to the City of Tacoma on the form set forth in these Contract documents;\n\nC. Provide a release of any outstanding liens that have been otherwise filed against any monies held or retained by the City of Tacoma;\n\nD. File with the City Director of Finance, and with the Director of the Washington State Department of Labor and Industries, on the state form to be provided, an affidavit of wages paid;\n\nE. File with the City Director of Finance, on the state form to be provided, a statement from the State of Washington, Department of Labor and Industries, certifying that the prevailing wage requirements have been satisfied.\n\nF. File with the City Director of Finance, on the state form to be provided, a statement of release from the Public Works Contracts Division of the State of Washington, Department of Labor and Industries, verifying that all industrial insurance and medical aid premiums have been paid.\n\nIf there is a fee assessed to the City for any certificate, release or other form required by law, the contractor agrees that the fee amount may be passed on to the Contractor and deducted from the monies paid to the Contractor.\n3.14 **FAILURE TO COMPLETE THE WORK ON TIME**\n\nShould the completion of the work required under the Contract be delayed beyond the expiration of the period herein set for the completion of said work, or such extension of said period as may be allowed by reason of unavoidable delays, there shall be deducted from the total Contract price of work, for each calendar day by which such completion shall be delayed beyond said period of such extension thereof the sum of $300 or a sum of money as set forth hereinafter in these Specifications, as the amount of such deduction per calendar day.\n\nSaid sum shall be considered not as a penalty, but as liquidated damages, which the City will suffer by reason of the failure of the Contractor to perform and complete the work within the period, herein fixed or such extensions of said period as may be allowed by reason of unavoidable delays.\n\nAny money due or to become due the Contractor may be retained by the City to cover said liquidated damages, and should such money not be sufficient to cover such damages, the City shall have the right to recover the balance from the Contractor or his/her Sureties.\n\nThe filing of any bid for the work herein contemplated shall constitute acknowledgment by the Respondent that he/she understands, agrees and has ascertained that the City will actually suffer damages to the amount hereinabove fixed for each and every calendar day during which the completion of the work herein required shall be delayed beyond the expiration of the period herein fixed for such completion or such extension of said period as may be allowed by reason of unavoidable delays.\n\n3.15 **CITY RESERVES RIGHT TO USE FACILITIES PRIOR TO ACCEPTANCE**\n\nThe City of Tacoma hereby reserves the right to use the facilities herein contracted prior to final acceptance under this Contract. The use of said facilities, as mentioned herein, shall not be construed as a waiver or relinquishment of any rights that the City of Tacoma has under this Contract.\n\n3.16 **LIST OF SUBCONTRACTORS**\n\nBid proposals for construction, alteration or repair of any building or other public works that may exceed $1,000,000 including tax shall satisfy the following requirement: Respondent shall submit as part of the bid, the names of the subcontractors, with whom the respondent, if awarded the contract, will subcontract performance of the work of heating, ventilation and air conditioning, plumbing as described in chapter 18.106 RCW, and electrical as described in chapter 19.28 RCW, or to name itself for the work. The respondent shall not list more than one subcontractor for each category of work identified, unless subcontractors vary with bid alternates, in which case the respondent must indicate which subcontractor will be used for which alternate. Failure to comply with this provision or the naming of two or more subcontractors to perform the same work shall require the City (pursuant to state law RCW 39.30.060) to determine that respondent's bid is nonresponsive; therefore, the bid will be rejected.<|endoftext|>Technique for cable laying and overhead line construction\n\n- Energy cable laying up to 680 kV\n- Fibre optic, mini and micro cables\n- Cable winding and length measuring\n- Overhead line construction up to 110 kV\n- Seminars and product instructions\n\nCable drum disc brake\n\nCable drum disc brake without drum fork, to order separately, for controlled unwinding of cable or line drums from the hydraulic drum jacks THD 20/25 - 30/50. Suitable for all a.m. cable drum shafts. One complete set as shown left consists of:\n\n- 1 steel shaft type KSDK, see above, to select acc. to capacity and width of the drum\n- 1 disc brake STBT 400\n- 1 drum fork suitable in diameter to the drum shaft, see below\n- 2 clamps fitting the drum shaft see below\n- 2 Centric cones fitting the drum shaft and the drum bore diameter, see below\n\n
\n\n
\n
Code
\n
Type
\n
Operation
\n
Braking
\n
At the cable
\n
kg
\n
\n\n\n
\n
350862
\n
STBT 400
\n
mechanic
\n
3200 Nm
\n
approx. 4.0 kN
\n
37.00
\n
\n\n
<|endoftext|>VWB3500\nVibration Welder\nTable Size 38\" (965mm) by 18\" (455mm)\n\nFEATURES\n- Electromechanical vibration head assembly (200-240Hz)\n- Super rigid four rail table slide system\n- Massive flame cut bridge\n- Solid state 15hp digital vibration drive\n- Hydraulic lift/clamp force max. 4500 lbs. (20,000 N), 20 gallon reservoir, (75.6 L)\n- Allen-Bradley® SLC 5/03 controller with two available expansion slots\n- Allen-Bradley Panel View 600 full color touch screen display\n- Intuitive and interactive comprehensive help menu\n- Part parameter monitoring with programmable limits\n- Choice of either English or Spanish menu structure\n- Automatic tuning\n- Programmable amplitude 0.040\" to 0.070\" (1.0 to 1.8 mm)\n- Weld by time and weld by distance (absolute or meltdown)\n- Interior work light\n- Optical zero force cycle activation switches\n- Light Curtain for single switch activation\n- Less than 80 db in operation (continuous measurement)\n- Dual external utility outlets\n\nSPECIFICATIONS\n- Table size 38\" x ", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " Heat Pumps, Final Rule”.\n\nENERGY MANAGEMENT CONTROL SYSTEM (EMCS) is an automated control system that regulates the energy consumption of a building by controlling the operation of energy consuming systems, and is capable of monitoring loads and adjusting operations in order to optimize energy usage and respond to demand response signals.\n\nENERGY OBTAINED FROM DEPLETABLE SOURCES is electricity purchased from a public utility, or any energy obtained from coal, oil, natural gas, or liquefied petroleum gases.\n\nENERGY OBTAINED FROM NONDEPLETABLE SOURCES is energy that is not energy obtained from depletable sources.\n\nENERGY STORAGE SYSTEM (ESS) is one or more devices, assembled together, that are capable of storing energy used for safely supplying electrical energy to selected loads at a future time.\n\nENFORCEMENT AGENCY is the city, county, or state agency responsible for issuing a building permit.\n\nENTHALPY RECOVERY RATIO (ERR) is a ratio of the change in enthalpy of the outdoor air supply to the difference in enthalpy between the entering supply airflow and the entering exhaust airflow, with no adjustment to account for that portion of the psychometric change in the leaving supply airflow that is the result of leakage of entering exhaust airflow rather than exchange of heat or moisture between the airstreams.\n\nENTIRE BUILDING is the ensemble of all enclosed space in a building, including the space for which a permit is sought, plus all existing conditioned and unconditioned space within the structure.\n\nENVELOPE (See “building envelope”.)\n\nESS READY INTERCONNECTION EQUIPMENT is equipment, including but not limited to an ESS ready panelboard, that can accommodate the connection of a distributed energy resource or an ESS capable of either automatic or manual isolation from the utility power source.\nESS READY PANELBOARD is a panelboard that can accommodate either automatic or manual switching between a utility power source to a distributed energy resource or an energy storage system, such as a split bus panelboard.\n\nEXFILTRATION is uncontrolled outward air leakage from inside a building, including leakage through cracks and interstices, around windows and doors, and through any other exterior partition or duct penetration.\n\nEXTERIOR FLOOR/SOFFIT is a horizontal exterior partition, or a horizontal demising partition, under conditioned space. For low-rise residential occupancies, exterior floors also include those on grade.\n\nEXTERIOR PARTITION is an opaque, translucent, or transparent solid barrier that separates conditioned space from ambient air or space. For low-rise residential occupancies, exterior partitions also include barriers that separate conditioned space from unconditioned space, or the ground.\n\nEXTERIOR ROOF/CEILING is an exterior partition, or a demising partition, that has a slope less than 60 degrees from horizontal, that has conditioned space below, and that is not an exterior door or skylight.\n\nEXTERIOR ROOF/CEILING AREA is the area of the exterior surface of exterior roof/ceilings.\n\nEXTERIOR WALL is any wall or element of a wall, or any member or group of members, which defines the exterior boundaries or courts of a building and which has a slope of 60 degrees or greater with the horizontal plane. An exterior wall or partition is not an exterior floor/soffit, exterior door, exterior roof/ceiling, window, skylight, or demising wall.\n\nEXTERIOR WALL AREA is the area of the opaque exterior surface of exterior walls.\n\nFAÇADE is the contiguous exterior of a building surface, but not limited to fenestration products.\n\nFACTORY is a building, structure, or space designated as Factory Group F that is used for assembling, disassembling, fabricating, finishing, manufacturing, packaging, repair or processing operations.\n\nFACTORY ASSEMBLED COOLING TOWERS are cooling towers constructed from factory-assembled modules either shipped to the site in one piece or put together in the field.\n\nFAN, EMBEDDED is a fan that is part of a manufactured assembly where the assembly includes functions other than air movement.\n\nFAN ARRAYS are multiple fans in parallel and in a single enclosure between two plenum sections in an air distribution system, where plenum means a compartment or chamber that forms a part of the air distribution system, and that is not used for occupancy or storage.\n\nFAN ELECTRICAL INPUT POWER (FAN kWdesign) is the electrical input power in kilowatts required to operate an individual fan or fan array at design conditions. It includes the power consumption of motor controllers, if present.\n\nFAN ENERGY INDEX (FEI) is the ratio of the electric input power of a reference fan to the electric input power of the actual fan as calculated per ANSI/AMCA 208-18 at fan system design conditions.\n\nFAN NAMEPLATE ELECTRICAL INPUT POWER (kW) is the nominal electrical input power rating stamped on a fan assembly nameplate.\n\nFAN SYSTEM includes all the fans that contribute to the movement of air through a point of a common duct, plenum, or cabinet.\n\nFAN SYSTEM, COMPLEX means a fan system that combines a single-cabinet fan system with other supply fans, exhaust fans, or both.\n\nFAN SYSTEM, EXHAUST/RELIEF is a fan system dedicated to the removal of air from interior spaces to the outdoors.\n\nFAN SYSTEM, MULTI-ZONE VARIABLE AIR VOLUME (VAV) is a fan system that serves three or more space-conditioning zones where airflow to each zone is individually controlled based on heating, cooling and/or ventilation requirements, indoor fan airflow varies as a function of load, and the sum of the minimum zone airflows is 40% or less of the fan system design conditions.\n\nFAN SYSTEM, RETURN is a fan system dedicated to removing air from interior spaces where some or all of the air is to be recirculated except during economizer operation.\nFAN SYSTEM, SINGLE-CABINET is a fan system where a single fan, single fan array, a single set of fans operating in parallel, or fans or fan arrays in series and embedded in the same cabinet, that both supplies air to a space and recirculates the air.\n\nFAN SYSTEM, SUPPLY-ONLY is a fan system that provides supply air to interior spaces and does not recirculate the air.\n\nFAN SYSTEM, TRANSFER is a fan system that exclusively moves air from one occupied space to another.\n\nFAN SYSTEM AIRFLOW (cfm) is the sum of the airflow of all fans with fan electrical input power greater than 1 kW at fan system design conditions, excluding the airflow that passes through downstream fans with fan input power less than 1 kW.\n\nFAN SYSTEM DESIGN CONDITIONS are operating conditions that can be expected to occur during normal system operation that result in the highest supply airflow rate to or from the conditioned spaces served by the fan system.\n\nFAN SYSTEM ELECTRICAL INPUT POWER (Fan kWdesign,system) is the sum of the fan electrical input power (Fan kWdesign) in kilowatts of all fans that are required to operate at fan system design conditions to supply air from the heating or cooling source to the conditioned spaces, return it to the source, exhaust it to the outdoors, or transfer it to another space.\n\nFENESTRATION: Includes the following:\n\nACE is an NFRC-Approved Calculation Entity that conducts calculations of fenestration product ratings for certification authorization using the NFRC Component Modeling approach and issues label certificates to Specifying Authorities for product certification authorization in accordance with NFRC requirements.\n\nALTERED COMPONENT is a new fenestration component that has undergone an alteration other than a repair and is subject to all applicable standards requirements.\n\nBAY WINDOW is a combination assembly which is composed of three or more individual windows either joined side by side or installed within opaque assemblies and which projects away from the wall on which it is installed. Center windows, if used are parallel to the wall on which the bay is installed, the end panels or two side windows are angled with respect to the center window. Common angles are 30° and 45°, although other angles may be employed.\n\nCHROMOGENIC GLAZING is a class of switchable glazing that includes active materials (e.g. electrochromic) and passive materials (e.g. photochromic and thermochromic) permanently integrated into the glazing assembly. Their primary function is to switch reversibly from a high transmission state to a low transmission state with associated changes in VT and SHGC.\n\nCLERESTORY FENESTRATION is fenestration installed above a roofline greater than or equal to 60° from the horizontal, or any portion of exterior vertical glazing greater than eight feet per floor above the finished floor of a space.\n\nCMA (component modeling approach) is a fenestration product certification program from the National Fenestration Rating Council (NFRC) that enables energy-related performance ratings for nonresidential fenestration products, including the thermal performance U-factor, Solar Heat Gain Coefficient, and Visible Transmittance.\n\nCMAST (Component Modeling Approach Software Tool) is an NFRC approved software that allows a user to create a fenestration product “virtually,” and generate its energy-related performance ratings, including the thermal performance U-factor, Solar Heat Gain Coefficient, and Visible Transmittance.\n\nCURTAIN WALL/STOREFRONT is an external non-bearing wall intended to separate the exterior nonconditioned and interior conditioned spaces. It also consists of any combination of framing materials, fixed glazing, opaque glazing, operable windows, or other in-fill materials. Note: Window wall is also included as part of the curtain wall/storefront fenestration category.\n\nDUAL-GLAZED GREENHOUSE WINDOWS is a double glass pane separated by an air or other gas space that adds conditioned volume but not conditioned floor area to a building.\n\nDYNAMIC GLAZING SYSTEMS are glazing systems that have the ability to reversibly change their performance properties, including U-factor, Solar Heat Gain Coefficient (", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " the area (by -5.4% during the period 1991-1996) due to the further decline in the manufacturing sector and construction, while local economy is increasingly based on services. The major negative change is recorded for Middlesbrough (-10.3%), the decline is more contained in Stockton (-4.9%) while Redcar and Cleveland maintains practically unaltered its employment levels (0.2%) (table 4.2). Employment fell in the manufacturing sector and construction especially in Stockton and Redcar and Cleveland while it increased slightly in Middlesbrough.35 Almost 70% of employment on Teesside is in the service sector while manufacturing absorbs 23.5% (table 4.3.). Service industries dominate employment opportunities for both men and women, but through non-standard contracts (TVJSU, 1995).\n\n35 The negative performance of the service sector and of total employment are explained by considering the re-organisation of the local governments' offices. In practice, there have been no huge job losses as figures would suggest; employees in the public sector have simply changed their employer, from the Cleveland County Council to the single boroughs.\nTable 4.2. Employment change by sector and borough, 1991-1996\n\n
\n\n
\n
Sector
\n
Middlesbrough
\n
Redcar & Cleveland
\n
Stockton on Tees
\n
Teesside
\n
\n\n\n
\n
Agriculture, fishing energy and water
\n
170
\n
-25
\n
390
\n
535
\n
\n
\n
Manufacturing
\n
570
\n
-1840
\n
-6090
\n
-7360
\n
\n
\n
Construction
\n
-30
\n
-50
\n
-1560
\n
-1640
\n
\n
\n
Services
\n
-6490
\n
1990
\n
3760
\n
-740
\n
\n
\n
Total
\n
-5790
\n
70
\n
-3500
\n
-9220
\n
\n
\n
\n
(-10.3%)
\n
(0.2%)
\n
(-4.9%)
\n
(-5.4%)
\n
\n\n
\n\nSource: TVJSU\n\nTable 4.3. Employees in employment by sector and borough, 1996\n\n
\n\n
\n
Sector
\n
Middlesbrough
\n
Redcar & Cleveland
\n
Stockton on Tees
\n
Teesside
\n
\n\n\n
\n
Agriculture, fishing energy and water
\n
1.3%
\n
2.6%
\n
1.8%
\n
1.9%
\n
\n
\n
Manufacturing
\n
10.5%
\n
33.6%
\n
26.5%
\n
23.5%
\n
\n
\n
Construction
\n
5.6%
\n
5.5%
\n
6.0%
\n
5.7%
\n
\n
\n
Services
\n
82.6%
\n
58.3%
\n
65.7%
\n
68.9%
\n
\n
\n
Total
\n
100.0%
\n
100.0%
\n
100.0%
\n
100.0%
\n
\n\n
\n\nSource: TVJSU\n\nTable 4.4. shows that the male full-time employment has decreased substantially in all the boroughs of Teesside, in favour of part-time occupations. Female full time employment instead has increased possibly due to employment opportunities in the public sector, in light manufacturing activities, and their association with lower costs of labour.\nDuring recent years, the work culture of the area has lost its original specificity to become increasingly attuned to the transformation of employment relations at national level. Flexibility in and out of the workplace has become the main principle governing employment relationships on Teesside where, due to the limited job opportunities, workers are expected to adapt to market demands. According to the projections by the TVJSU (1999), the trends in employment highlighted above will characterise the local labour market until 2006. Accordingly, a net increase of jobs is likely to be recorded in the service sector (approximately 18,000), with a slight rise in employment in construction, while employment in manufacturing is expected to fall (-3,500 jobs). Part-time employment will characterise the new job creation (80% of new jobs will be on the basis of part-time or fixed contracts) while the number of people with two or more jobs is also likely to increase (+2000). Yet, the changing structure of the local economy and the persistence of deep pools of unemployed people seem to have delineated also other categories of workers. Indeed, during the 1990s besides people with two or more jobs and those in casual employment, the local labour market has progressively witnessed the increase in people working on fixed-term contracts (jobs are created for the duration of a specific project) and in the black economy, although no official statistics are available for the area (ibid.).\n\n36 Essentially the ability to allocate labour to a wide range of tasks previously constrained by skill demarcations (functional flexibility).\n\n37 The reference is to external or organisational flexibility whereby labour is utilised according to changing production needs.\n4.5. Conclusions\n\nIn summary, the end of full male employment on Teesside has resulted from the interaction of market and non-market forces, and a major role has to be attributed to Teesside's specific industrial culture. The institutional configuration of the area was centred upon a few big companies. A culture of consensus characterised capital and labour relations whereby worker wage benefits were inextricably linked to company profitability gains. In addition, companies committed to the community through the production of profits in and through Teesside. Yet, the area's governing structures were attuned to the demand of capital. However, such a social pact could hardly be honoured when the convergence of economic events and policy interventions unfavourably affected local industrial performance. From the end of the 1970s, the local labour market saw a growing number of workers expelled from productive processes and, for those still at work, a re-configuration of employment practices. At the same time, the shift from standard forms of employment to non-standard contracts has affected the local culture of work which is now based, as at wider level, upon the principle of flexibility.\n\nPart 2 – Explaining industrial unemployment in the chemicals sector\n\n4.6. Introduction\n\nThe mid-1980s marked the onset of the latest phase of profound restructuring for the chemicals industry on Teesside which is still on-going. As previous comprehensive research work is dated around the mid-1980s (Hudson, 1983; Foord et al., 1985; Chapman, 1986), the information presented here, covering the 1990s, is quite original. Global changes in the industry had started to undermine ICI, the main company of the area and a major international player already by the end of the 1970s. Unable to maintain technological leadership in a market where the entry of new players soon led to saturation and an industry-wise decrease in profitability, ICI started a major process of industrial restructuring. This consisted of re-positioning its business and, at the same time, embarked upon a cost-cutting policy which impacted decisively on the cost of labour. The exit from the most cyclically vulnerable segments of the market, and a radical re-organisation of employment relations have become the driving imperatives of ICI during the 1990s.\nThe reading of the process of employment change in the chemical industry of Teesside presented below contrasts with the dominant academic view (Bruno and Sachs, 1985; CEPR, 1995; OECD, 1994; Layard et al., 1994) that attacks wages and labour rigidity. Whilst not denying that ICI was characterised by an ‘expensive’ model of employment relations that it reproduced over the years, I show that its re-organisation of the business and re-definition of employment relations must be considered in the light of the modified global sectoral environment of the company. Yet, in contrast with orthodox claims, the corporate restructuring path has been centred upon the downward adjustment of the employment relation.\n\nSection 4.7. reviews the historical development of the chemical industry on Teesside, by providing also an account of the sectoral industrial culture. Section 4.8. analyses the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": "RICAL GENERAL NOTES FOR 2019 CBC (continued)\n\n10) Screw anchors shall be Powers Screw-Bolt+/Hangermate+, Mason Ind. N.Y. SAST, or Hilti Kwik HUS-EZ/HUS-EZ I for minimum 3000 psi concrete slabs, beams, or walls and concrete filled decks (sand light or normal weight) installed in accordance with ICC Reports ICC ESR 3889, 2713 or 3027, respectively. Testing shall be done in the presence of the special inspector and a report of the test results shall be submitted to the enforcement agency. If any anchors fail, test all previously untested anchors installed by the same trade until 20 consecutive anchors pass. Then resume the original test frequency. Screw anchors shall not be tested using a torque wrench. Screw anchors may be loosened a maximum of one full turn to facilitate the positioning of a tension test collar. Following the tension test, the anchor shall be re-torqued in accordance with the manufacturer's installation instructions. Refer to page A0.5 for test loads.\n\nNotes on Suspended Raceways:\n\n1) Per 2019 CBC Sections 1601.1.4 & 1617A.1.18 applicable only to OSHPD-1, 2, 4, 5 and 1R designated projects, distributed conduit, cable trays and raceways weighing 5 lbs/ft or less are exempt from design for the seismic forces of ASCE 7-16 Section 13.3. For remaining electrical distribution systems, per 2019 CBC Section 1617A1.26, cable trays and raceways shall be designed for seismic forces and seismic relative displacements. In addition, conduit equal to or greater than 2.5\" trade size and attached to panels, cabinets, or other equipment subject to seismic relative displacements shall be provided with flexible connections or designed for seismic forces and seismic relative displacements. Design for the seismic forces and relative displacements shall not be required for raceway and associated components to accommodate the relative displacement between component and piping, where the cable tray or raceway is positively attached to the structure, and where one of the following apply:\n a) Trapeze assemblies with 3/8\" or 1/2\" diameter rod hangers not exceeding 12\" in length from the conduit, cable tray, or raceway support point to the connection at the supporting structure are used to support the cable tray or raceway, and the total weight supported by any single trapeze is 100 lbs or less; or\n b) The conduit, cable tray, or raceway is supported by individual rod hangers 3/8\" or 1/2\" in diameter, and each hanger in the raceway run is 12\" or less in length from the conduit, cable tray, or raceway support point connection to the supporting structure, and the total weight supported by any single rod is 50 lbs or less.\n\n2) Design for the seismic forces and relative displacements shall not be required for conduit, regardless of the value of Ip, where the conduit size is less than 2.5\" trade size.\n\n3) Cable tray transverse and longitudinal brace spacing shall not exceed those specified by the manufacturer. Rigid Metal Conduit (RMC, Schedule 40 pipe), Intermediate Metal Conduit (IMC), and Electrical Metallic Tubing (EMT), shall be braced at spacings tabulated in Section S. Longitudinal brace spacings shall not exceed 3 times the tabulated transverse brace spacings. For cases where multiple conduits with varying brace spacings are supported on a trapeze, the smallest brace spacing shall govern. The seismic design engineer may design brace spacings for trapezed conduits based on combined conduits sections and/or by adding steel strengthening sections on a job by job basis subject to approval by the enforcement agency.\n\n4) Transverse restraints for cable trays shall be installed at general support locations. Cable trays must be positively fastened to the support as detailed in Section E.\nELECTRICAL GENERAL NOTES (continued)\n\n7) If a 2 piece rod is used to support raceways, minimum engagement of the rod in the coupling nut shall be equal to the rod diameter. Rods shall be run up tight in the coupling nut.\n\n8) For vertical support methods at seismic brace locations other than what are detailed in this manual, the seismic design engineer must provide calculations and/or testing of any additional components or materials (e.g. hangers, clamps, etc.) to comply with the 2013 CBC on a job by job basis subject to review and approval by the enforcement agency.\n\n9) Electrical pull boxes installed directly in-line with the conduit systems (no flexes) may be supported and laterally braced as part of the conduit bracing system. Where necessary, consider the ability of the conduit(s) to transfer gravity and seismic loads to adjacent vertical supports and braces.\n\nNotes on Vertical Risers:\n\n1) Vertical raceways supported at each floor shall be considered seismically braced if the penetration through each floor is tightly packed and the floor to floor spacing does not exceed the maximum brace spacing tabulated in Section S. Tops of risers exceeding 3 feet shall be provided with a 4-way brace. Where the 4-way brace is attached to the horizontal raceway, it shall be installed within 2 feet of the centerline of the riser.\n\n2) Vertical raceways in an open shaft must be attached to steel supports with both steel supports and connections sized to accept the combined gravity and seismic loads. Thermal loads shall be considered, where applicable. Lateral seismic restraint spacings for conduit shall not exceed the spacings tabulated in Section S. Supports and connections must be engineered on a job by job basis subject to approval by the enforcement agency. Seismic relative displacement between floors shall be considered in the design.\n\n3) A conduit penetrating a floor with the annular space packed with firestop may act as an all-directional brace at the end of a horizontal conduit run as described in Note 1 above and depicted on Page A24.0 if the distance from the centerline of the floor to the top of the horizontal conduit is less than 'A', where 'A' is a function of the maximum transverse brace spacing, 'S', as defined on Page A22.1.\nELECTRICAL GENERAL NOTES FOR 2019 CBC (continued)\n\n5) Seismic restraints for trapeze supported conduit shall be attached to the trapeze member at the hanger locations as detailed in Section F. Conduits supported by trapezes at seismic brace locations shall utilize Mason West, Inc. Type SSC, strut steel clamp (Refer to Page X8.0) for Rigid Metal Conduit (RMC, Schedule 40 pipe) and 2½\" to 4\" diameter EMT or IMC or Type SSCE, strut steel clamp for up to 2\" diameter EMT or IMC (Refer to Page X8.0) utilizing details in Section F.\n\n6) The conduit weights tabulated in the appendix for RMC, IMC, and EMT materials consider the conduit full of conductors to approximate the maximum operating weight. Similarly, the cable tray weight tabulated in the same section consider the cable trays full of cable as allowed by the National Electrical Code (NEC).\n\n7) If a 2 piece rod is used to support raceways, minimum engagement of the rod in the coupling nut shall be equal to the rod diameter. Rods shall be run up tight in the coupling nut.\n\n8) For vertical support methods at seismic brace locations other than what are detailed in this manual, the seismic design engineer must provide calculations and/or testing of any additional components or materials (e.g. hangers, clamps, etc.) to comply with the 2013 CBC on a job by job basis subject to review and approval by the enforcement agency.\n\n9) Electrical pull boxes installed directly in-line with the conduit systems (no flexes) may be supported and laterally braced as part of the conduit bracing system. Where necessary, consider the ability of the conduit(s) to transfer gravity and seismic loads to adjacent vertical supports and braces.\n\nNotes on Vertical Risers:\n\n1) Vertical raceways supported at each floor shall be considered seismically braced if the penetration through each floor is tightly packed and the floor to floor spacing does not exceed the maximum brace spacing tabulated in Section S. Tops of risers exceeding 3 feet shall be provided with a 4-way brace. Where the 4-way brace is attached to the horizontal raceway, it shall be installed within 2 feet of the centerline of the riser.\n\n2) Vertical raceways in an open shaft must be attached to steel supports with both steel supports and connections sized to accept the combined gravity and seismic loads. Thermal loads shall be considered, where applicable. Lateral seismic restraint spacings for conduit shall not exceed the spacings tabulated in Section S. Supports and connections must be engineered on a job by job basis subject to approval by the enforcement agency. Seismic relative displacement between floors shall be considered in the design.\n\n3) A conduit penetrating a floor with the annular space packed with firestop may act as an all-directional brace at the end of a horizontal conduit run as described in Note 1 above and depicted on Page A24.0 if the distance from the centerline of the floor to the top of the horizontal conduit is less than 'A', where 'A' is a function of the maximum transverse brace spacing, 'S', as defined on Page A22.1.\nELECTRICAL DESIGN PROCEDURE\n\nFollow the five steps below to determine the seismic kit", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-industrial", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-industrial/part-00-00000.npy", "text": " the aqueous additive compositions are free of color-imparting and effect-imparting pigments and they are also preferably free of curing agents.\n\nThe amount of layered silicate in the layered silicate containing aqueous additive compositions and/or the amount of the layered silicate containing aqueous additive composition in the water-based coating composition can preferably be chosen such that a content of layered silicate (solid) of 0.05 to 0.5, preferably of 0.05 to 0.3 percent by weight, based on the total amount of the water-based coating composition, i.e. based on the total amount of the ready-to-spray water-based coating composition, is obtained.\n\nThe aqueous additive compositions containing layered silicate according to the invention are stable in storage and may be stored without thickening and gelling, for example over a period of approx. 2 years without any problems. Prior art aqueous additive compositions containing layered silicate do not exhibit this long-term storage stability. They gel prematurely. While prior art compositions may indeed be re-liquefied by appropriate stirring, their rheological activity is then lost.\n\nThe aqueous additive compositions containing layered silicate are used for the production of color-imparting and/or special effect-imparting water-based coating compositions, in particular for the production of color-imparting and/or special effect-imparting water-based base coat coating compositions or water-based color-imparting and/or special effect-imparting one-layer top coat coating compositions in the context of single layer or multilayer coating. Color-imparting and/or special effect-imparting should here be taken to mean that the corresponding coating compositions contain only color-imparting pigments, only special effect-imparting pigments or color-imparting and special effect-imparting pigments. The coatings produced with these color-imparting and/or special effect-imparting coating compositions are here intended to impart a\ndesired color, a desired special effect or a desired color in combination with a special effect to the substrate to be coated. The present invention thus also relates to the use of the aqueous additive compositions for production of water-based coating compositions, in particular for production of color-imparting and/or special effect-imparting water-based base coat coating compositions.\n\nThe present invention is also directed to a process for the production of water-based coating compositions containing layered silicate, in particular water-based base coat coating compositions, wherein the layered silicates are incorporated into the water-based coating composition in the form of the above-defined aqueous additive compositions containing layered silicate. The aqueous additive compositions containing layered silicate may here be incorporated into a finished water-based coating composition or into constituents thereof.\n\nThe aqueous additive compositions containing layered silicate are preferably added to an already completely formulated pigmented water-based coating composition, in particular a water-based base coat coating composition or water-based one-layer top coat coating composition. This may proceed, for example, by manual stirring or by shaking. The aqueous additive composition containing layered silicate is preferably incorporated into the pigmented water-based coating composition immediately before application. Due to its very good storage stability, the aqueous additive composition containing layered silicate may be produced as a semifinished product and stored until use. It may thus also be used, for example, as a component of a \"paint mixing system\", as is in particular used in vehicle repair coating for the production of color-imparting and/or special effect-imparting base coat coating compositions. As is known, such a paint mixing system is based on a defined number of individual mixing components containing coloring and/or special effect pigments and optionally further for example binder components, which can be mixed as required to yield a coating with the desired color/special effect.\n\nIt is, of course, also possible to incorporate the aqueous additive compositions containing layered silicate according to the invention during\nthe production of an water-based coating composition produced from scratch. In principle, the water-based coating compositions containing the aqueous additive compositions also exhibit excellent storage stability of for example up to six months.\n\nThe water-based coating compositions containing the aqueous additive compositions contain the conventional constituents of a water-based pigmented base coat coating composition or one-layer top coat coating composition: color-imparting and/or special effect-imparting pigments, one or more binders and water and optionally at least one of the following constituents: crosslinking agents, fillers, conventional coating additives and organic solvents.\n\nExamples of binders are conventional film-forming, water-dilutable binders familiar to the person skilled in the art, such as water-dilutable polyester resins, water-dilutable (meth)acrylic copolymer resins or water-dilutable polyester/(meth)acrylic copolymer hybrids and water-dilutable polyurethane resins or polyurethane/(meth)acrylic copolymer hybrids. These may be reactive or non-functional resins.\n\nThe water-based coating compositions may be self drying (physically drying), self crosslinking or externally crosslinking. Accordingly, the water-based coating compositions may contain crosslinking agents, such as, for example, free or blocked polyisocyanates or amino resins, for example, melamine resins. Selection of the optionally used crosslinking agents depends on the type of crosslinkable groups in the binders and is familiar to the person skilled in the art. The crosslinking agents may be used individually or in combination. The mixing ratio of crosslinking agent solids to binder solids amounts, for example, to 10:90 to 40:60, preferably 20:80 to 30:70.\n\nThe water-based coating compositions contain conventional coating pigments, for example, special effect pigments (effect-imparting pigments) and/or color-imparting pigments selected from among white, colored and black pigments.\nExamples of special effect pigments are conventional pigments which impart to a coating a special effect, e.g. a color and/or lightness flop dependent on the angle of observation, are metal pigments. Example of metal pigments are those made from aluminum, copper or other metals, interference pigments such as, for example, metal oxide coated metal pigments, for example, iron oxide coated aluminum, coated mica such as, for example, titanium dioxide coated mica, pigments which produce a graphite effect, iron oxide in flake form, liquid crystal pigments, coated aluminum oxide pigments, coated silicon dioxide pigments. Examples of white, colored and black pigments are the conventional inorganic or organic pigments known to the person skilled in the art, such as, for example, titanium dioxide, iron oxide pigments, carbon black, azo pigments, phthalocyanine pigments, quinacridone pigments, pyrrolopyrrole pigments, perylene pigments.\n\nThe water-based coating compositions may contain conventional coating additives in conventional quantities, for example, of 0.1 to 5 wt.%, relative to the solids content thereof. Examples are neutralizing agents, antifoaming agents, wetting agents, adhesion promoters, catalysts, levelling agents, anticratering agents, thickeners and light stabilizers.\n\nThe water-based coating compositions may contain conventional coating solvents, for example, in a proportion of preferably less than 20 wt.%, particularly preferably of less than 15 wt.%. These are conventional coating solvents, which may originate, for example, from the production of the binders or are added separately. Examples of such solvents are those mentioned already above in the description of the layered silicate containing compositions.\n\nWater-based coating compositions have solids contents of, for example, 10 to 45 wt.%, preferably of 15 to 35 wt.%. The ratio by weight of pigment content to the resin solids content is, for example, from 0.05:1 to 2:1. For special-effect water-based base coat coating compositions it is preferably 0.06:1 to 0.6:1 and for solid color (single-tone) water-based base coat coating compositions it is preferably higher, for example, 0.06:1.\nto 2:1, in each case relative to the weight of solids.\n\nThe water-based coating compositions have for example viscosities in the range of 50 to 300 mPas (measured at a shear rate of 235 s\\(^{-1}\\) with HAAKE viscosimeter Typ RS1). These low viscous coating compositions can easier be filtered and applied compared to high viscous coating compositions.\n\nThe water-based coating compositions may be used for the production of a color- and/or special effect-imparting single-stage top coating layer within a one- or multilayer coating or preferably for the production of the color- and/or special effect-imparting coating layer within a base coat/clear coat two-layer coating. The water-borne base coating compositions or single-stage top coating compositions may be applied by conventional methods. They are preferably applied by spraying to a dry film thickness of, for example, 8 to 40 µm; for special-effect water-borne base coats the dry film thickness is, for example, 8 to 25 µm, while for solid color water-borne base coats it is preferably greater, for example, 10 to 40 µm. In case of basecoat/clear coat two-layer coating application preferably proceeds by the wet-on-wet process, i.e. after a flash-off phase, for example, at 20 to 80°C, the water-based base coat layers are overcoated with a clear coat to a dry film thickness of preferably 30 to 60 µm and dried or crosslinked together with the latter at temperatures of, for example, 20 to", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " from 1907 with the commotion around Synge's *The Playboy of the Western World*. The second confrontation follows only two years later and involves George Bernard Shaw's *The Shewing-Up of Blanco Posnet*. Shaw had written the play for Her Majesty's Theatre, but was refused a license from the Lord Chamberlain on the grounds of blasphemy. Thereupon Shaw offers the play to the Abbey, which is located in an other jurisdiction and can therefore not be convicted. In August of that year the play is performed and becomes a huge success. Yeats has made a stand that artistic integrity should\ncome before political influence, and his persistence restores much of the popularity the Abbey had lost in 1907. The third and final upheaval takes place in 1926. After several years of struggling – mainly financially – the Abbey greets a new playwright, Séan O'Casey. His first two plays are welcomed with great enthusiasm, but his third play, *The Plough and the Stars*, causes a storm of protest reminiscent of the riots that had accompanied Synge's play. Even some of the actors object to the sexual and religious content of particular scenes. The Directors hold firm, however, and partly due to the commotion the play is performed to full houses. Up to this day O'Casey's controversial piece is a very well-known and well-liked play.\n\nThe Abbey Theatre is symptomatic for Yeats' passion and conviction in accomplishing his scheme to educate the people. His choice of plays that tell a genuine Irish story has at times been controversial, but his perseverance eventually earns him the respect of friends and foes. In 1925 he is responsible for making the Abbey the first state-supported theatre in the British Isles, and even after his withdrawal it remains primarily a theatre of the writers and the people.\n\n3.2.3 Literature\n\n3.2.3.1 The Wanderings of Oisin\n\n*The Wanderings of Oisin* is an epic poem in the style of Homer's *Odyssey* that tells the story of Oisin, a great Irish hero. After he falls in love with the faery princess Niamh, she and Oisin exchange the mortal realm for three immortal faery isles where they live and feast for three hundred years. After this time, Oisin regrets leaving his friends behind and he wishes to return to his old world to visit them. He lends Niamh's faery horse but is told he cannot touch the ground or he will instantly become mortal again. Upon his return Oisin notices that the world he left behind has changed dramatically. His fellow warriors are dead and Christianity has replaced the religion and traditions of pagan Ireland. When he tries to help two men lift a\nsack full of sand from the ground, his saddle girth breaks and he falls onto the ground where\nthe three hundred years he spent in faery land catch up with him in a single moment. The\nentire poem consists of three parts and is constructed as a dialogue between Oisin and St.\nPatrick after Oisin's return to the mortal world.\n\nYeats writes the main part of his great epic poem in Sligo during the summer and\nautumn of 1889. It is the first in what has to become a Légende des Siècles, narrating and\nglorifying the Irish history. The story of this poem is largely taken from legends in the Fenian\nor Ossianic Cycle. The Fenian Cycle or Fiannaídheacht centres around the mythical hero\nFionn mac Cumhaill. He is the leader of a band of warriors called the Fianna Éireann, who\nroam the country looking for adventure and warfare. He is also Oisin's father and that is the\nreason why the Fenian Cycle is known as the Ossianic Cycle too. Yeats puts a number of the\noriginal stories together to create his own adaptation of the legend. Apart from the Fenian\nCycle, Yeats mentions two other sources for this poem. The first is “a most beautiful old poem\nby one of the numerous half-forgotten Gaelic poets who lived in Ireland in the last century.”\n(Wade 132) This poem, left unnamed by Yeats, has been identified by Alspach as Michael\nComyn's “The Lay of Oisin on the Land of Youth” (850). This poem deals with the same topic\nas Yeats' and especially in the opening lines Yeats stays very close to the original (851). The\nsecond source Yeats mentions is rooted in his own tradition and concerns the islands Oisin\nvisits. According to Yeats these stem from the “three phantom islands” (Wade 132) of Tír na\nnÓg, also known as the Land of the Young or the Land of Promise. As the most popular of the\n\nLa Légende des Siècles (1859, 1877, 1883) is a collection of poems by Victor Hugo (1802 – 1885), depicting\nthe history and evolution of humanity by a series of epic poems. Yeats plans a similar attempt for Irish history\nand this is his first contribution. Although he writes several more stories on the same topic – including his Cú\nChulainn series – he will later admit that he had not been able to fully realise his ambitions.\n\nThe Fenian Cycle is one of four major cycles of Irish mythology. The others are the Mythological Cycle, the\nUlster Cycle – featuring Cú Chulainn – and the Historical Cycle.\nmythological Otherworlds, Tír na nÓg is a place of eternal life and therefore resembles the Valhalla of Scandinavian mythology or the Christian representation of Heaven. Since all these sources are well-known among the people as a popular part of their heritage, Yeats successfully constructs the basis for a revival of ancient Ireland.\n\nThere are a few parallels that can be drawn between the story and real-life in Yeats' time that allow us to understand the intended effect of the poem better. First of all, there is the main character Oisin. Being a legendary hero, he possesses fearsome strength and relentless courage. With Hutchinson's theory in mind, he is clearly used as a role model for the Irish people here, and his admirable characteristics should be pursued by everyone. Furthermore, he belongs to a notorious group of warriors who are renowned all over the world and into the next. When Oisin finds out his comrades have died during his absence, he praises their bravery that transcends even the Realm of Death:\n\n> “Put the staff in my hands; for I go to the Fenians, O cleric, to chant\n> The war-songs that roused them of old; they will rise, making clouds with their breath,\n> Innumerable, singing, exultant; the clay underneath them shall pant,\n> And demons be broken in pieces, and trampled beneath them in death.\n> And demons afraid in their darkness; deep horror of eyes and of wings,\n> Afraid, their ears on the earth laid, shall listen and rise up and weep;\n> Hearing the shaking of shields and the quiver of stretched bowstrings,\n> Hearing Hell loud with a murmur, as shouting and mocking we sweep.”\n\n(“The Poems of W. B. Yeats” 61-2)\n\nWhat makes these lines and this poem so effective, is the cadence of the rhythm and the repetition of sounds that make these images palpable. Through these lines the Fenians are\nresurrected and once again ready to fight. Considering the centuries of domination Ireland has undergone by the time Yeats writes this poem, this is intended as a reminder to the Irish people that their situation has not always been like this and that it can be changed again if they can find the courage and strength to stand up to their oppressor.\n\nThe second parallel supports the notion that Ireland's situation has deteriorated under English rule. When Oisin returns to the old world he has left behind, he finds it has completely changed. He mourns the loss of his companions in arms and sees how St. Patrick's Christianity has replaced the old pagan beliefs. This blaming of Christianity for the disappearance of paganism is in Yeats' time not without danger. Religion is a key aspect of the nationalist struggle and the tension between Catholics and Protestants is tangible. However, it is very unlikely that Yeats meant to directly target any of the two Christian divisions. Although he is a Protestant himself, he never meddles in religious quarrels nor does he take a clear stand in the discussion. It is more likely that Yeats stages St. Patrick merely to stay true to the original material. Rather than wanting to invoke a religious debate, he contrasts both worlds in the story to emphasise their differences. In the same way that Oisin compares his original life to the new one, Yeats compares modern to ancient Ireland. He thus effectively links the deplorable state of the story's world to contemporary Ireland, turning Oisin's lament for the loss of his homeland into a nineteenth century elegy.\n\n3.2.3.2 Cathleen ni Houlihan\n\n*Cathleen ni Houlihan* tells the story of an Irish peasant family on the eve of their oldest son Michael's marriage. The family is in good spirits, showing the wedding clothes and discussing how to spend the dowry. When they hear a commotion coming from the town, Patrick, the youngest son, is sent out to find out what is going on. During his absence an old woman approaches the house and is warmly welcomed by the family. She later announces that\nshe goes by the names of Poor Old Woman, or Cathleen, daughter of Houlihan. She begins to\ntell a sad story about how her", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": ";\nBut it is past:\nCome day, come night, day comes at last.\n\nWe loosed hand from hand,\nWe parted face from face;\nEach went his way to his own land.\nAt his own pace,\nEach went to fill his separate place.\n\nIf we should meet one day,\nIf both should not forget,\nWe shall clasp hands the accustomed way,\nAs when we met\nSo long ago, as I remember yet.\n\nII\n\nWhere my heart is (wherever that may be)\nMight I but follow!\nIf you fly thither over heath and lea,\nO honey-seeking bee,\nO careless swallow,\nBid some for whom I watch keep watch for me.\n\nAlas! that we must dwell, my heart and I,\nSo far asunder.\nHours wax to days, and days and days creep by;\nI watch with wistful eye,\nI wait and wonder:\nWhen will that day draw nigh—that hour draw nigh?\n\nNot yesterday, and not, I think, to-day;\nPerhaps to-morrow.\nDay after day 'to-morrow' thus I say:\nI watched so yesterday\nIn hope and sorrow,\nAgain to-day I watch the accustomed way.\n\nChristina Georgina Rossetti\nTwist me a crown of wind-flowers;\nThat I may fly away\nTo hear the singers at their song,\nAnd players at their play.\nPut on your crown of wind-flowers:\nBut whither would you go?\nBeyond the surging of the sea\nAnd the storms that blow.\nAlas! your crown of wind-flowers\nCan never make you fly:\nI twist them in a crown to-day,\nAnd to-night they die.\n\nChristina Georgina Rossetti\nUnder The Ivy Bush\n\nUnder the ivy bush\nOne sits sighing,\nAnd under the willow tree\nOne sits crying:\nUnder the ivy bush\nCease from your sighing,\nBut under the willow-tree\nLie down a-dying.\n\nChristina Georgina Rossetti\n'The iniquity of the fathers upon the children.'\n\nOh the rose of keenest thorn!\nOne hidden summer morn\nUnder the rose I was born.\n\nI do not guess his name\nWho wrought my Mother's shame,\nAnd gave me life forlorn,\nBut my Mother, Mother, Mother,\nI know her from all other.\nMy Mother pale and mild,\nFair as ever was seen,\nShe was but scarce sixteen,\nLittle more than a child,\nWhen I was born\nTo work her scorn.\nWith secret bitter throes,\nIn a passion of secret woes,\nShe bore me under the rose.\n\nOne who my Mother nursed\nTook me from the first:—\n'O nurse, let me look upon\nThis babe that costs so dear;\nTo-morrow she will be gone:\nOther mothers may keep\nTheir babes awake and asleep,\nBut I must not keep her here.'—\nWhether I know or guess,\nI know this not the less.\n\nSo I was sent away\nThat none might spy the truth:\nAnd my childhood waxed to youth\nAnd I left off childish play.\nI never cared to play\nWith the village boys and girls;\nAnd I think they thought me proud,\nI found so little to say\nAnd kept so from the crowd:\nBut I had the longest curls\nAnd I had the largest eyes\nAnd my teeth were small like pearls;\nThe girls might flout and scout me,\nBut the boys would hang about me\nIn sheepish mooning wise.\n\nOur one-street village stood\nA long mile from the town,\nA mile of windy down\nAnd bleak one-sided wood,\nWith not a single house.\nOur town itself was small,\nWith just the common shops,\nAnd throve in its small way.\nOur neighbouring gentry reared\nThe good old-fashioned crops,\nAnd made old-fashioned boasts\nOf what John Bull would do\nIf Frenchman Frog appeared,\nAnd drank old-fashioned toasts,\nAnd made old-fashioned bows\nTo my Lady at the Hall.\n\nMy Lady at the Hall\nIs grander than they all:\nHers is the oldest name\nIn all the neighbourhood;\nBut the race must die with her\nThough she's a lofty dame,\nFor she's unmarried still.\nPoor people say she's good\nAnd has an open hand\nAs any in the land,\nAnd she's the comforter\nOf many sick and sad;\nMy nurse once said to me\nThat everything she had\nCame of my Lady's bounty:\n'Though she's greatest in the county\nShe's humble to the poor, \nNo beggar seeks her door \nBut finds help presently. \nI pray both night and day \nFor her, and you must pray: \nBut she'll never feel distress \nIf needy folk can bless.'\n\nI was a little maid \nWhen here we came to live \nFrom somewhere by the sea. \nMen spoke a foreign tongue \nThere where we used to be \nWhen I was merry and young, \nToo young to feel afraid; \nThe fisher folk would give \nA kind strange word to me, \nThere by the foreign sea: \nI don't know where it was, \nBut I remember still \nOur cottage on a hill, \nAnd fields of flowering grass \nOn that fair foreign shore.\n\nI liked my old home best, \nBut this was pleasant too: \nSo here we made our nest \nAnd here I grew. \nAnd now and then my Lady \nIn riding past our door \nWould nod to Nurse and speak, \nOr stoop and pat my cheek; \nAnd I was always ready \nTo hold the field-gate wide \nFor my Lady to go through; \nMy Lady in her veil \nSo seldom put aside, \nMy Lady grave and pale.\n\nI often sat to wonder \nWho might my parents be, \nFor I knew of something under\nMy simple-seeming state.\nNurse never talked to me\nOf mother or of father,\nBut watched me early and late\nWith kind suspicious cares:\nOr not suspicious, rather\nAnxious, as if she knew\nSome secret I might gather\nAnd smart for unawares.\nThus I grew.\n\nBut Nurse waxed old and grey,\nBent and weak with years.\nThere came a certain day\nThat she lay upon her bed\nShaking her palsied head,\nWith words she gasped to say\nWhich had to stay unsaid.\nThen with a jerking hand\nHeld out so piteously\nShe gave a ring to me\nOf gold wrought curiously,\nA ring which she had worn\nSince the day I was born,\nShe once had said to me:\nI slipped it on my finger;\nHer eyes were keen to linger\nOn my hand that slipped it on;\nThen she sighed one rattling sigh\nAnd stared on with sightless eye:—\nThe one who loved me was gone.\n\nHow long I stayed alone\nWith the corpse I never knew,\nFor I fainted dead as stone:\nWhen I came to life once more\nI was down upon the floor,\nWith neighbours making ado\nTo bring me back to life.\nI heard the sexton's wife\nSay: 'Up, my lad, and run\nTo tell it at the Hall;\nShe was my Lady's nurse,\nAnd done can't be undone.\nI'll watch by this poor lamb.\nI guess my Lady's purse\nIs always open to such:\nI'd run up on my crutch\nA cripple as I am,'\n(For cramps had vexed her much)\n'Rather than this dear heart\nLack one to take her part.'\n\nFor days day after day\nOn my weary bed I lay\nWishing the time would pass;\nOh, so wishing that I was\nLikely to pass away:\nFor the one friend whom I knew\nWas dead, I knew no other,\nNeither father nor mother;\nAnd I, what should I do?\n\nOne day the sexton's wife\nSaid: 'Rouse yourself, my dear:\nMy Lady has driven down\nFrom the Hall into the town,\nAnd we think she's coming here.\nCheer up, for life is life.'\n\nBut I would not look or speak,\nWould not cheer up at all.\nMy tears were like to fall,\nSo I turned round to the wall\nAnd hid my hollow cheek\nMaking as if I slept,\nAs silent as a stone,\nAnd no one knew I wept.\nWhat was my Lady to me,\nThe grand lady from the Hall?\nShe might come, or stay away,\nI was sick at heart that day:\nThe whole world seemed to be\nNothing, just nothing to me,\nFor aught that I could see.\n\nYet I listened where I lay:\nA bustle came below,\nA clear voice said: 'I know;\nI will see her first alone,\nIt may be less of a shock\nIf she's so weak to-day:'—\nA light hand turned the lock,\nA light step crossed the floor,\nOne sat beside my bed:\nBut never a word she said.\n\nFor me, my shyness grew\nEach moment more and more:\nSo I said never a word\nAnd neither looked nor stirred;\nI think she must have heard\nMy heart go pit-a-pat:\nThus I lay, my Lady sat,\nMore than a mortal hour—\n(I counted one and two\nBy the house-clock while I lay):\nI seemed to have no power\nTo think of a thing to say,\nOr do what I ought to do,\nOr rouse myself to a choice.\n\nAt last she said: 'Margaret,\nWon't you even look at me?'\nA something in her voice\nForced my tears to fall at last,\nForced sobs from me thick and fast;\nSomething not of the past,\nYet stirring memory;\nA something new, and yet\nNot new, too sweet to last,\nWhich I never can forget.\n\nI turned and stared at her:\nHer cheek showed hollow-pale;\nHer hair", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": "609, nabob, rupee 1612, gurn, pariah, tyre/tyer 1613, sabib 1627, cot 1634, pundit 1672, bungalow 1676, dungaree 1696, tom-tom 1693, maharaja, pukka, mongoose 1698, jute 1746, shampoo (vb) 1762 and jungle 1776.\n\nThe languages of Indo-China, mostly Malay, are the immediate source of a few Early Modern English loans, including bamboo 1598, paddy 1623, cockatoo 1634, orangoutang 1699 and kapok 1750. There are also some words borrowed from Chinese, such as Japan 1577, litchi 1588, ginseng 1654 and ketchup 1711. Japanese loan words include shogun 1615, sake 1687, soy 1696 and mikado 1727.\n\nWith the first English colonies in Virginia and New England, direct contacts were established with North America in the early seventeenth century. Besides the rich inheritance of place names, there are a number of words relating to wildlife and the local ways of life that were borrowed from North-American Indian languages, for instance, racoon 1608, opossum 1610, moccasin, persimmon 1612, moose 1613, wigwam 1628, papoose, skunk, tomahawk 1634, hickory 1676, totem 1760 and totem 1760. Direct South-American loans are, by contrast, rare – Inca 1594, jaguar 1604 and jacaranda 1753 are among the few recorded. Much of the lexical influence of South-American Indian languages was mediated through Spanish (see above, 5.4.3.3.3).\n\n5.5 Word-formation\n\n5.5.1 Introduction\n\nWord-formation is concerned with the patterns of language on which new lexemes are formed. It accounts for composites which are analysable both\nformally and semantically. Basically they consist of a sequence of a modifying element (determinant) and the element modified (determinatum). Using this distinction, the main EModE word-formation processes can be described in terms of free lexemes or bases and bound affixes as follows (Marchand 1969: 2; Lyons 1977: 521; Quirk et al. 1985: 1520):\n\n1. derivations consisting of an affix and a base:\n a. prefixation adding a prefix (determinant) to the base (determinatum) without a change of word class (hero → anthero (1714); see 5.5.2)\n b. suffixation adding a suffix (determinatum) to the base (determinant), usually with a change of word class (modernize → modernizer (1739); see 5.5.3)\n\n2. compounding adding a base to another (bread + basket → bread-basket (1522), determinant + determinatum; see 5.5.4)\n\n3. conversion (or zero-derivation) assigning the base to a different word class without changing its form (pioneer n. (1523) → pioneer vb (1780); see 5.5.5)\n\nThis classification reflects the important typological change in English from stem-formation in Old English to word-formation as we know it today. In the course of the Middle English period invariant free lexemes came to be established as bases for word-formation, and the rich stem allomorphy of OE was largely lost in derivational morphology (see Kastovsky 1985, 1992a). In this respect Early Modern English is already Modern. As far as productive means of affixation are concerned, however, it is expanding. At the end of the period, the set of productive prefixes and suffixes closely resembles the present-day one.\n\nWord-formation processes are best classified in structural terms, i.e. in terms of the word-classes that they apply to and those that they produce. So terms such as denominal and deverbal are used below to refer to lexemes formed from nouns and verbs, respectively. Moderniser is an instance of a deverbal noun, a noun derived from the verb modernise by means of the suffix -er. Prefixes also apply to specific word classes but no word-class change is effected as a result of prefixation. Since prefixes constitute a closed class, the options available at any given time are accounted for by a semantic classification of the productive elements (see 5.5.2).\n\nForeign influence is reflected in Early Modern English word-formation in a sharp increase of non-native elements as productive affixes. New affixes arise as a sufficient number of borrowed complex lexemes are interpreted as morphologically transparent. This happened to a wealth of Middle English loans, which were integrated into English and analysed as consisting of a base and a separate meaningful affix. The new adoptive affixes had\na profound effect on the composition of the Early Modern English lexicon in that, as the number of affixes multiplied, non-native elements clearly outnumbered the native in terms of both type and token frequency.\n\nAs most of these newly adopted affixes were practically limited to foreign – Romance and classical – bases, the effects of their naturalisation can be seen in a quantitative shift towards a non-native basis of coining new words in Early Modern English. This development finally establishes two lexical strata in the English lexicon, with some far-reaching consequences for the phonological and morphological makeup of the language (see Lass, this volume).\n\nAccording to the information contained in the CED, the share of Germanic bases in new coinages falls from about thirty-two per cent at the beginning of the Early Modern English period to some thirteen per cent at the end. They are outnumbered by French and, since the end of the sixteenth century, Latin bases. It is in fact Latin that is the single most frequent source of new derivations from the mid-seventeenth century onwards. An even more dramatic change is observed in the etymological distributions of affixes. At the beginning of our period, the proportion of native affixes was some eighty per cent of all new derivations, but at the end, a mere thirty per cent (Wermser 1976: 64, 67).\n\n5.5.2 Prefixation\n\nWhile prefixation was poorly represented in Middle English word-formation, proportionately more new prefixes were introduced into Early Modern English than suffixes. This multiplication of prefixes increased synonymous means of derivation, especially in literary and other technical registers.\n\nWe may turn to hybrid forms in order to see how well the new affixes were integrated. The use of Latinate affixes with native bases spread in Early Modern English. This suggests that they were analysable to native speakers and becoming assimilated into the Early Modern English lexicon. It is, however, interesting to note that very few new hybrids of this kind occur in the writings of Elyot, Ascham, Mulcaster, Jonson and other scholars of the time. Most classicists were conservative and preferred homogeneous morphemes. They may be contrasted with more liberal neologisers, who did not hesitate to combine heterogeneous elements.\n\nGarner (1983) compared Shakespeare’s use of twelve Latinate and five native prefixes in hybrid forms with their use in the 1611 Authorised Version of the Bible. The Latin prefixes included were con-, contra-, de-, dis-,\nin- (negative), inter-, post-, pre-, pro-, re-, super- and trans-; the native forms were be-, fore-, out-, over- and under-. Garner found that Shakespeare used 101 different hybrid words 178 times altogether. If hybrids with un- are included, the number of hybrid lexemes rises to 400. The Authorised Version contains only seven hybrids used twenty-four times in all; with the prefix un-, the number amounts to forty-one, approximately one tenth of the number found in Shakespeare. None of those appearing in the Bible are new formations, but most of them go back to Middle English, whereas Shakespeare can here be credited with as many as 137 neologisms. The rest of his hybrids are mostly renaissance formations. If un- is excluded from the account, only the following hybrids occur in the Bible: recall, renew, fore-ordain, overcharge, overpast, overplus and overturn; of them, only the forms with re involve a borrowed prefix. By contrast, the sole prefixes with no hybrid forms in Shakespeare are de- and pro-, both still of limited use in Early Modern English. It appears that, even in the Renaissance, hybrids were often controlled by etymological considerations. Hence learned borrowing did not promote maximal integration of the borrowed elements.\n\nUnlike many borrowed suffixes, prefixes do not affect the sound structure of the base, but they may themselves carry either a secondary or primary stress (see further Lass, this volume). As they do not change the word-class of the base, and (some two thirds of the productive prefixes in Early Modern English) are not limited to any one", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " fictions of the 1750s’ (Lupton, 2011, p. 292), features the opposite approach to authorial narration, increasing the self-reflexive tendency of the technique to the point of excess. This is done, for one thing, by playfully emphasizing the family resemblances to Fielding’s work. In the introduction, the narrative voice is explicitly marked as imitating Fielding’s style. The narrator\n\n12 The novel has been attributed to Sarah Fielding (who is still listed as the author, for example, in the catalogue of the digital library of the Bayerische Staatsbibliothek), but the critical consensus seems to be that this is a misattribution (see Foster, 2004, p. 62; Moore, 2013, p. 759).\nintroduces himself as an illegitimate child, ‘the first begotten, of the poetical issue, of the much celebrated Biographer of Joseph Andrews, and Tom Jones’ (CS I, p. 3). The homage to Fielding is furthermore evident both in the highly intrusive authorial commentary and in the novel’s plot: the protagonist, the orphaned Charlotte Summers, is taken in by the benevolent, Allworthy-like Lady Bountiful. Like Tom Jones, Charlotte is forced to leave and to go on an adventurous journey that eventually brings her to London and unsavoury places like a brothel and a debtor’s jail. In the end, both her lost parents reappear, so that (again like Tom Jones) she turns out not to be an orphan after all, and she is allowed to marry the man she loved all along, Lady Bountiful’s son Thomas.\n\nLike the authorial narrator in Fielding’s novels, the narrator of Charlotte Summers throughout the novel comments extensively not only on the characters and events but particularly conspicuously on his narrative technique, which is frequently compared with Fielding’s. He resolves to imitate, for instance, the division into chapters and books, which are prefaced by digressive introductory chapters:\n\n> These were Mr. F—g’s nodding Places for his Readers; for he it seems could not take a Nap, but he was obliged to pump and sweat for laborious Dullness to please them […]; but it was his Misfortune to be a Wit, and consequently out of his natural Element when endeavouring to be really stupid; but for me whose Wit is borrowed and the Effect of Art, and to whom Dullness is natural, there is nothing in Nature more easy to me than to take a sound Nap with my Readers for twenty pages together (CS I, p. 33).\n\nSuch playful disparagements of his own abilities are typical of this narrator, who is preoccupied with the question of how the reader will experience and react to the narrative. One main means of exploring this question is to take the trope of the author-reader relationship as face-to-face interaction to an extreme: the narrator not only envisages himself, like Fielding in Tom Jones, as an inn-keeper who provides for his guests (CS I, p. 4) and as the arbitrator of social relationships who brings his readers ‘into the Company’ (CS I, p. 12) of the characters. He also offers a whole scenario in which the READING IS TRAVELLING and the READING IS SOCIAL INTERACTION metaphors are combined and extended:\n\n13 Citations are to the Corbett edition from 1750 (available on ECCO).\nBefore I introduce my Readers to the Company of Miss Charlotte Summers, I must make them acquainted with some of her Friends [...], for which Purpose, I must beg their Company as far as Carmarthenshire, in Wales. [...] We Authors are always provided with an easy flying Carriage, which can waft our Readers in an Instant [...]: We are Masters of a Kind of Magic, that we have only to speak the Word, and \n\npresto, you are transported [...] to the Place where we would have you attend us. Don’t you find already the magical Effect? The Journey is over, and we are just alighted at the Gate of a stately old Building [...]. You may enter freely, I’ll conduct you to the Parlour, where you may have the Honour to salute the hospitable Owner of this venerable Mansion (CS I, p. 13).\n\n‘Author’ and ‘reader’ are both imagined as acting participants in the fictional world rather than as the producer and recipient of a book. Of course, by explicitly evoking the process of readerly immersion into the fictional world, the narrator disrupts rather than enhances it. Similarly, by insisting on the supernatural powers of the author, the narrator draws attention to the *differences* between actual travel and the reader’s mental travel, the magical use of words to affect time and space, and the writer’s use of words to describe time and space. The outlandish image of the author’s superior power raises the question of his or her actual influence: what kind of impact do narratives actually have on their readers?\n\nIn fact, the specific image of the magician is itself already ambivalent with regard to the question of power. He could either be a wizard performing real magic, or an illusionist with a bag of tricks – the word ‘presto’, in particular, suggests a commercial performance rather than a supernatural action. Like the innkeeper who needs to advertise his services and keep his customers happy in order to make a living, the magician could then also be read as a figure representing the dependence of the author on the reader. The reader is somebody to be manipulated, but also to be enticed and convinced (in the rhetorical manoeuvre performed in the passage) – and also somebody who may prove to be beyond the author’s control, and even in turn exerting control on the author. Rather than just asserting a sense of authorial power (however playfully), this passage – like many of the other metadiscursive comments – raises the question of its extent and limits.\n\nThis ambivalence with regard to author-reader relations is also evident in a particularly noticeable feature of the novel: its projection of possible reader reactions as concrete situations or interjections (a technique that was subsequently also used, among others, by Laurence Sterne in *Tristram*\nShandy and, a century later, by William Makepeace Thackeray in Vanity Fair):\\textsuperscript{14}\n\nI fancy by this Time, my Readers are pretty well acquainted with the Lady Bountiful, and ready to thank me for the Pains I have taken, to introduce them into such valuable company, but I can hear Beau Thoughtless and pretty Miss Pert, whispering to one another, ‘Hang the old Woman, I wish we were done with her, we have seen enough of her, I wish to see the young Wench, there has been so much talk about, whereabout can she be? Sure she’s locked up in the old Lady’s Closet. The Devil take our Conductor, after leading us such a Dance, from London to Carmarthenshire, to keep us so long from what we want to see;’ but I must inform the pretty Triflers, that I am determined my Readers shall learn something in every Chapter, and in this, amongst other Things, they much learn and practice Patience [...]. But that you may not be altogether discourag’d, I must tell you, that I am now going to speak of her [Lady Bountiful’s] Faults; a Subject I am sure you cannot be so soon weary of, as it borders so much on your dearly beloved scandal (CS I, pp. 24-25).\n\nFurther reader figures whose reactions are described in detail include Miss Censorious, who is shocked (though also fascinated) by any hints of sexual misconduct, Arabella Dimple, who reads Charlotte Summers in bed and has taken the already-cited commentary about the nap seriously, so that she has to turn back a few pages to understand what is going on in the narrative, and the Widow Lackit, who insists that the novel’s ending include the protagonist’s marriage.\n\nWayne Booth points out the ridiculous character of ‘this multifarious “reader”, who is always, underneath his various disguises, the same stupid person introduced for the real and unspecified reader to laugh at’ (Booth, 1952, p. 181). Clearly, these reader figures represent expectations towards the novel that are not altogether admirable (though not, I would argue, identical): Thoughtless and Pert want racy entertainment, Miss Censorious wants an affirmation of her hypocritical sense of moral superiority, and the Widow Lackit wants vicarious gratification. The actual reader is certainly not invited to identify with these satirically drawn figures, and by evoking concrete circumstances and even dialogue, the novel makes them appear as a special type of fictional character rather than a stand-in for myself as\n\n\\textsuperscript{14} Booth, in fact, sees Charlotte Summers as a missing link between Tom Jones and the more radically self-reflexive Tristram Shandy (see Booth, 1952, p. 181).\nI am perusing the text. However, it should be noted that the novel, while making fun of these readers’ attitudes and demands, at the same time caters to them. The way Thoughtless, Pert and Censorious talk about Charlotte, for example, highlights the sexual interest that can be taken in the descriptions of the ‘young wench’, who is, like Richardson’s Pamela and Clarissa, continually exposed to unwanted sexual attention in the novel (and, for example, nearly raped by a man who adopts the same trick as Mr. B. in *Pamela* when he switches places with the heroine’s maid and bedfellow one night). Similarly", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " a list of contributors, see page 59.\nTHE MORAL WARRIOR\nEthics and Service in the U.S. Military\nMARTIN L. COOK\n\nFor the first time in history, the capabilities of the U.S. military far outstrip those of any potential rival, either singly or collectively, and this reality raises fundamental questions about its role, nature, and conduct. The Moral Warrior explores a wide range of ethical issues regarding the nature and purpose of voluntary military service, the moral meaning of the unique military power of the United States in the contemporary world, and the moral challenges posed by the “war” on terrorism.\n\n“The Moral Warrior is a thoughtful, subtle, and penetrating study of the ethical challenges that military leaders need to meet as they respond to demanding new missions from Kosovo to Iraq. Martin L. Cook is a fine teacher: clear, undogmatic, and compassionate. I hope his views find a wide audience.”\n— Michael Ignatieff, Carr Professor of Human Rights Policy at the Kennedy School of Government, Harvard University\n\n“The book reflects the author’s unique personal and academic background: trained in the study of ethics, he chose to teach at one of the nation’s war colleges, where he became deeply familiar with contemporary military issues in a way unavailable to most. This is throughout a highly intelligent, engaging, and accessible book. It adds the important perspective of what it means in moral terms to be a soldier and sets a new standard for what needs to be included in thinking seriously about the United States’ use of military force.”\n— James Turner Johnson, author of Morality and Contemporary Warfare\n\n“Martin Cook reflects on the difficult moral choices facing American military and policy planners as they employ the latest technologies to fight a new global war. Cook brings to that reflection not only expertise in philosophy, law, and history, but also a deep appreciation of ground-level, operational detail. He has produced an indispensable resource.”\n— Joel H. Rosenthal, President of the Carnegie Council on Ethics and International Affairs\n\nCurrently Professor of Philosophy at the United States Air Force Academy, Martin L. Cook spent five years as Professor of Ethics at the United States Army War College.\nSUSTAINABILITY AND SPIRITUALITY\n\nJOHN E. CARROLL\n\nFOREWORD BY BILL MCKIBBEN\n\nThis groundbreaking book explores the inherent interconnectedness of sustainability and spirituality, acknowledging the dependency of one upon the other. John E. Carroll contends that true ecological sustainability, in contrast to the cosmetic attempts at sustainability we see around us, questions our society's fundamental values and is so countercultural that it is resisted by anyone without a spiritual belief in something deeper than efficiency, technology, or economics. Carroll draws on the work of cultural historian and “geologian” Thomas Berry, whose eco-spiritual thought underlies many of the sustainability efforts of communities described in this book, including particular branches of Catholic religious orders and the loosely organized Sisters of the Earth. The writings of Native Americans on spirituality and ecology are also highlighted. These models for sustainability not only represent the tangible link between ecology and spirituality, but also, more importantly, a vision of what could be.\n\n“Carroll begins his journey looking for examples of environmental sustainability, and I think he has found them—more convincing examples than people who have looked in more obvious and secular places. But along the way he has found something related, and just as important: examples of human sustainability, hints about ways that we might reshape our attitudes as compellingly as our kitchens and gardens and boilers.” — from the Foreword by Bill McKibben\n\n“Carroll clearly addresses a key topic for those interested in the relationship between ecology and ethics, and makes clear that sustainability is not possible without a deep change of values and commitment to a lifestyle. It cannot be achieved simply as an expression of economic functionality nor as an expression of ideology alone.”\n— Rosemary Radford Ruether, coeditor of Christianity and Ecology: Seeking the Well-Being of Earth and Humans\n\nJohn E. Carroll is Professor of Environmental Conservation at the University of New Hampshire. He is the author and editor of many books, including (with coeditor Keith Warner) Ecology and Religion: Scientists Speak.\nInterviews with prominent filmmakers, actors, and others on the art, craft, and business of moviemaking.\n\nA volume in the SUNY series, Cultural Studies in Cinema/Video\n\nWheeler Winston Dixon, editor\n\n320 pp.\nIllustrated: 17 b/w photographs\n$29.95 pb ISBN 0-7914-6156-4\n$86.50 hc ISBN 0-7914-6155-6\n\nJuly\n\nFILM STUDIES\n\nFor a list of contributors, see page 59.\n\nFILM VOICES\n\nInterviews from Post Script\nGERALD DUCHOVNAY, EDITOR\n\nThis collection of interviews brings together major Hollywood directors and actors, independent filmmakers, screenwriters, and others to discuss the art, craft, and business of making movies. Whether it be Clint Eastwood or Francis Ford Coppola, Vittorio Storaro or Dede Allen, these filmmakers detail how they strive for quality, the price they pay to do so, and how new technologies and the business aspects of filmmaking impact all aspects of their creativity. Taken together, the interviews reveal much about filmmaking practices in and out of Hollywood.\n\n“Instead of adhering to the usual tendencies to valorize prominent Hollywood figures, this book balances ‘mainstream’ directors with ‘independent’ and international voices. And, most innovatively, the book extends the notion of filmmaker beyond directors to include editors, actors, screenwriters, and cinematographers. The interviews provide fascinating insights into each filmmaker’s work and his or her views on filmmaking, and they contain a wealth of information about conditions of production, styles of filmmaking, the selection and use of actors, the filmmakers’ conceptions of editing, the uses of lighting and color, cinematography, and cultural, political, and aesthetic points of view.” — Marcia Landy, author of Italian Film and coeditor of Stars: The Film Reader\n\nThe interviewees include Dede Allen, Robert Altman, Jamie Babbit, Don Bluth, Francis Ford Coppola, Robert Downey Sr., Clint Eastwood, Atom Egoyan, Horton Foote, Stephen Frears, Barbara Hammer, Louis Malle, Sydney Pollack, Oliver Stone, Vittorio Storaro, Paul Verhoeven, and James Woods.\n\nGerald Duchovnay is Professor of English and Head of the Department of Literature and Languages at Texas A&M University at Commerce. He is general editor of the international film journal Post Script: Essays in Film and the Humanities and author of Humphrey Bogart: A Bio-Bibliography.\nBASHŌ’S HAIKU\nSelected Poems of Matsuo Bashō\nMATSUO BASHŌ\nTranslated and with an Introduction by DAVID LANDIS BARNHILL\n\nBashō’s Haiku offers the most comprehensive translation yet of the poetry of Japanese writer Matsuo Bashō (1644–1694), who is credited with perfecting and popularizing the haiku form of poetry. One of the most widely read Japanese writers, both within his own country and worldwide, Bashō is especially beloved by those who appreciate nature and those who practice Zen Buddhism. Born into the samurai class, Bashō rejected that world after the death of his master and became a wandering poet and teacher. During his travels across Japan, he became a lay Zen monk and studied history and classical poetry. His poems contained a mystical quality and expressed universal themes through simple images from the natural world.\n\nDavid Landis Barnhill’s brilliant book strives for literal translations of Bashō’s work, arranged chronologically in order to show Bashō’s development as a writer. Avoiding wordy and explanatory translations, Barnhill captures the brevity and vitality of the original Japanese, letting the images suggest the depth of meaning involved. Barnhill also presents an overview of haiku poetry and analyzes the significance of nature in this literary form, while suggesting the importance of Bashō to contemporary American literature and environmental thought.\n\n“This is a very well-researched translation of Bashō’s poetry that does an outstanding job of presenting this valuable material for those interested in Japanese culture, especially literature and religion. It is a first-rate work that clearly reflects the author’s long and intense devotion and commitment to the topic. It will stand out as unique because of the range of poetry that it covers.”\n— Steven Heine, coeditor of Japan in Traditional and Postmodern Perspectives\n\nDavid Landis Barnhill is Director of Environmental Studies and Professor of English at the University of Wisconsin at Oshkosh. He is the coeditor (with Roger S. Gottlieb) of Deep Ecology and World Religions: New Essays on Sacred Ground, also published by SUNY Press, and the editor of At Home on the Earth: Becoming Native to Our Place: A Multicultural Anthology.\nPsychoanalysts have traditionally been expert at uncovering what afflicts and damages people, argues Jeffrey B. Rubin, but by focusing on narcissism and perversions, depression and sadism, psychoanalysis has all too often disregarded what nourishes and sustains us. In *The Good Life*, he demonstrates how psychoanalysis can make a profound contribution to the well-lived life by drawing on a neglected but potent aspect of psychoanalysis—its capacity to illuminate a psychology of health as well as illness. Rubin shows that, at its best, psychoanalysis can highlight both the ingredients of love, ethics, creativity, and spirituality, as well as the obstacles to experiencing them. Exploring the good life from this dual perspective provides an indispensable resource for helping us live with greater meaning and vitality.\n\n“The author has picked areas of basic importance to thread through psychoanalysis and spirituality: love, ethics, and creativity. He discusses important research in each", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " makes a being human or inhuman. These two texts rely upon something “other” in order to analyze the fears of humanity, along with their tendencies toward godlessness and loss of humanity. In both cases, the “other” often exhibits more human characteristics than the other characters within the works, thus challenging the reader’s perceptions and expectations regarding what is considered human and what disturbs the title of “monster”.\n\nShelley’s *Frankenstein* is a classic horror novel, celebrated by some as the first science fiction novel ever written. The idea of a being having been created in a laboratory environment is frightening to the Victorian reader as it is unheard of and considered playing God. Creation is supposed to remain the privilege of an all-powerful Being, not a mere fiddling with chemicals and materials. The idea of a mad scientist mentality is frightening in its simplicity and relatability, for curiosity is a universal human emotion, and the consequences of such are often not as horrible as in this particular instance. In\nVictorian society, doubting religion in the favor of science was considered commonplace and yet strictly cerebral. In practice, it was frowned upon and even demonized, thus ensuring a negative reaction to this particular novel (O’Malley 178), for disgust and concern were considered common emotions in relation to the creation of the entity within *Frankenstein*, inciting pity and fear simultaneously and complicating the perception of all characters within the novel. Indeed, the typical Victorian reader would be likely to hold the same opinion as the novel itself in regards to experimentation with such creation: “How dangerous is the acquirement of knowledge and how much happier that man is who believes his native town to be the world, than he who aspires to be greater than his nature will allow” (Shelley 37). This statement in regards to the experiments of the doctor and the subsequent consequences is most poignant, for it looks backward instead of forward within the confines of the novel itself, although it does warn others who may desire to tinker with creation. This warning also improves the reliability of the narrator since hindsight is better informed than anyone within the situation itself, and his experiences throughout his life definitively point to his regret at his scientific experimentation and its consequences.\n\nAdditionally, the personality of the created itself varies throughout the novel, thus calling into question the very definition of what makes a being monstrous or human. It is considered a monster by both its creator and the average reader, yet there is quite a bit of ambivalence surrounding whether or not that is due to nature or nurture, for it appears that it is the rejection by Dr. Frankenstein that inspires such violence and terror-inducing actions, instead of a blatantly primal desire to inspire fear and loathing. Indeed, this novel is a testament to the effects of reacting negatively to an individual’s appearance, for over\ntime it wears down the ability to perceive oneself as anything but a monster. Indeed, the\ncreature itself appears to be fully aware of this fact: “I do know that for the sympathy of\none living being, I would make peace with all. I have love in me the likes of which you\ncan scarcely imagine and rage the likes of which you would not believe. If I cannot\nsatisfy the one, I will indulge the other” (Shelley 101). This statement of emotion\nillustrates this creature’s desire for love and affection, just as any other being desires the\nsame. It is also incredibly important to witness the self-awareness and sentience of this\ncreated being, an awareness so strong that it could be considered far better than that of its\ncreator, who knew little enough of himself to cause him to create a creature he was\nunable to love and protect after the fact.\n\nThis novel has perhaps the most complicated approach to godlessness of the texts\nunder consideration, for it does include a monstrous creature who wreaks havoc and does\nmany horrible things, yet the true godlessness lies not in the created, but in the creator. It\nis through playing God that humanity loses its morality and descends into godlessness,\nthus plunging Dr. Frankenstein into that state. Through playing God and attempting to\ncreate a creature in his own image, Dr. Frankenstein does the exact opposite:\n\n‘Hateful day when I received life!' I exclaimed in agony. 'Accursed creator! Why\ndid you form a monster so hideous that even you turned from me in disgust? God,\nin pity, made man beautiful and alluring, after his own image; but my form is a\nfilthy type of yours, more horrid even from the very resemblance. Satan had his\ncompanions, fellow-devils, to admire and encourage him; but I am solitary and\nabhorred.’ (Shelley 88)\nIt is an entirely new type of madness to create that which does not wish to be created, for it is clear that the monster wishes he had never been born, as his life has been one rejection after another, spiraling into violence and seclusion. To create merely from a scientific curiosity is utterly inadequate and ultimately harmful to everyone and everything involved. The doctor destroys his life and the life of many others – including the life of his created – by mere curiosity and the hunger for power and knowledge. This is what true godlessness is: dabbling in that which man was never intended to.\n\nThe idea of the creature as a monster due to perception instead of complete accuracy is furthered by his ability to appreciate the world into which he came. Indeed, he is far more capable than most of humanity, becoming easily fascinated by the surrounding nature. This is perhaps because the creature considers itself damned and unredeemable, yet perhaps he is merely misunderstood and not given a chance by anyone who encounters him. Its appreciation of the simple joys of life is certainly not matched by the doctor, instead far surpassing him:\n\nEven broken in spirit as he is, no one can feel more deeply than he does the beauties of nature. The starry sky, the sea, and every sight afforded by these wonderful regions, seems still to have the power of elevating his soul from earth. Such a man has a double existence: he may suffer misery, and be overwhelmed by disappointments; yet, when he has retired into himself, he will be like a celestial spirit that has a halo around him, within whose circle no grief or folly ventures.\n\n(Shelley 192)\n\nThis passage in and of itself may be enough to redeem him in a reader’s eye, drawing on pity as opposed to disgust and fear. This detailed account of the thoughts and desires of\nthis creature touches a chord, for its humanity is apparent and its appreciation of its surroundings obvious. In this manner, it is in conjunction with the finer feelings of humanity and religion, challenging the novel to provide a valid argument for this creature being a monster. Thus, the most terrifying thing within this novel becomes the thought of creating a living thing from that which was merely chemicals or, worse, that which was dead and never intended to live again. The morbidity of the scientific experiments is thrilling, yet utterly godless and therefore unforgiveable, especially due to the consequences, unforeseen or otherwise. Scientific experimentation, although fascinating and encouraged from a medical point of view, would never have been considered a gateway to creation, but instead to prolonging life already given. Dr. Frankenstein’s cursed attempts at creating something other would be shunned in civilized society, thus agreeing with his own fears and attempts at concealment (O’Malley 79). It is therefore Frankenstein himself who ensures that his creature is a monster merely by creating it; he furthers this impression as he himself considers it damned due to its unnatural appearance.\n\nMeyer’s *The Host* deals with a detailed alien species much calmer and more induced to peaceful society than our own, thus bringing the very ethics of the existence of our own species into question and enabling exploration of the depths of human emotion. The fear of loss of humanity is incredibly complex within this novel, for humanity is irrevocably entwined with an alien entity, making the two nearly one and the same. This allows exploration of two different types of psyche, as well as looking at the consequences of complete loss of humanity in such unusual circumstances.\nThis novel is unique in that it possesses two heroines residing in the same body: an alien dubbed Wanda and the physical host body of Melanie. These two characters have completely different personalities, making characterization complex and complicating the reactions other characters have toward them. Additionally, as Wanda is an alien species attempting to take over and inhabit the planet, there is a great deal of animosity toward her. This anger and fear is indicative of what loss of humanity truly means, and this unfolds throughout the novel. There are times when Wanda, being alien, acts in a far gentler, more humane way than any other character present or aware of the situation. For example, in desperation to understand the ways in which the aliens inhabit the physical bodies of humans, the group with which Wanda and Melanie live often experiments on the bodies of captured alien-infested humans in an attempt to understand the connection. Through their ignorance about the connection between the two species, they wreak havoc instead of acquiring helpful knowledge:\n\nBrighter than these were other silver things. Shimmering segments of silver stretched in twisted, tortured pieces across the table…tiny silver strands plucked and naked and scattered…splatters of silver liquid smeared on the table, the blankets, the walls… The quiet in the room was shattered by my scream. The whole room was shattered. It spun and shook to the sound, whirled around me so that I couldn’t find the way out. The walls, the silver-stained walls, rose up to block my escape no matter which way I turned. (Meyer 547)\n\nThis passage is the clearest and rawest instance of Wanda’s humanity, or her sense of morality and", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": "ed neither north nor south,\nNeither east nor west,\nBut sat him down at Megan's feet\nAs love-bird on his nest,\nAnd wooed her with a silent awe,\nWith trouble not expressed;\nShe sang the tears into his eyes,\nThe heart out of his breast:\nSo he loved her, listening so.\n\nShe sang the heart out of his breast,\nThe words out of his tongue;\nHand and foot and pulse he paused\nTill her song was sung.\nThen he spoke up from his place\nSimple words and true:\n'Scantly goods have I to give,\nScantly skill to woo;\n\nBut I have a will to work,\nAnd a heart for you:\nBid me stay or bid me go.'\n\nThen Megan mused within herself:\n'Better be first with him,\nThan dwell where fairer Margaret sits,\nWho shines my brightness dim,\nFor ever second where she sits,\nHowever fair I be:\nI will be lady of his love,\nAnd he shall worship me;\nI will be lady of his herds\nAnd stoop to his degree,\nAt home where kids and fatlings grow.'\n\nSped a shepherd from the height\nHeadlong down to look,\n(White lambs followed, lured by love\nOf their shepherd's crook):\nHe turned neither east nor west,\nNeither north nor south,\nBut knelt right down to May, for love\nOf her sweet-singing mouth;\nForgot his flocks, his panting flocks\nIn parching hill-side drouth;\nForgot himself for weal or woe.\n\nTrilled her song and swelled her song\nWith maiden coy caprice\nIn a labyrinth of throbs,\nPauses, cadences;\nClear-noted as a dropping brook,\nSoft-noted like the bees,\nWild-noted as the shivering wind\nForlorn through forest trees:\nLove-noted like the wood-pigeon\nWho hides herself for love,\nYet cannot keep her secret safe,\nBut coos and coos thereof:\nThus the notes rang loud or low.\n\nHe hung breathless on her breath;\nSpeechless, who listened well;\nCould not speak or think or wish\nTill silence broke the spell.\nThen he spoke, and spread his hands,\nPointing here and there:\n'See my sheep and see the lambs,\nTwin lambs which they bare.\nAll myself I offer you,\nAll my flocks and care,\nYour sweet song hath moved me so.'\n\nIn her fluttered heart young May\nMused a dubious while:\n'If he loves me as he says'--\nHer lips curved with a smile:\n'Where Margaret shines like the sun\nI shine but like a moon;\nIf sister Megan makes her choice\nI can make mine as soon;\nAt cockcrow we were sister-maids,\nWe may be brides at noon.'\nSaid Megan, 'Yes;' May said not 'No.'\n\nFair Margaret stayed alone at home, \nAwhile she sang her song, \nAwhile sat silent, then she thought: \n'My sisters loiter long.'\n\nThat sultry noon had waned away, \nShadows had waxen great: \n'Surely,' she thought within herself, \n'My sisters loiter late.'\n\nShe rose, and peered out at the door, \nWith patient heart to wait, \nAnd heard a distant nightingale \nComplaining of its mate;\n\nThen down the garden slope she walked, \nDown to the garden gate, \nLeaned on the rail and waited so.\n\nThe slope was lightened by her eyes \nLike summer lightning fair, \nLike rising of the haloed moon \nLightened her glimmering hair,\n\nWhile her face lightened like the sun \nWhose dawn is rosy white. \nThus crowned with maiden majesty \nShe peered into the night,\n\nLooked up the hill and down the hill, \nTo left hand and to right, \nFlashing like fire-flies to and fro.\n\nWaiting thus in weariness \nShe marked the nightingale \nTelling, if any one would heed, \nIts old complaining tale.\n\nThen lifted she her voice and sang, \nAnswering the bird: \nThen lifted she her voice and sang, \nSuch notes were never heard\n\nFrom any bird when Spring's in blow.\n\nThe king of all that country \nCoursing far, coursing near,\nCurbed his amber-bitted steed,\nCoursed amain to hear;\nAll his princes in his train,\nSquire, and knight, and peer,\nWith his crown upon his head,\nHis sceptre in his hand,\nDown he fell at Margaret's knees\nLord king of all that land,\nTo her highness bending low.\n\nEvery beast and bird and fish\nCame mustering to the sound,\nEvery man and every maid\nFrom miles of country round:\nMegan on her herdsman's arm,\nWith her shepherd May,\nFlocks and herds trooped at their heels\nAlong the hill-side way;\nNo foot too feeble for the ascent,\nNot any head too grey;\nSome were swift and none were slow.\n\nSo Margaret sang her sisters home\nIn their marriage mirth;\nSang free birds out of the sky,\nBeasts along the earth,\nSang up fishes of the deep--\nAll breathing things that move\nSang from far and sang from near\nTo her lovely love;\nSang together friend and foe;\n\nSang a golden-bearded king\nStraightway to her feet,\nSang him silent where he knelt\nIn eager anguish sweet.\nBut when the clear voice died away,\nWhen longest echoes died,\nHe stood up like a royal man\nAnd claimed her for his bride.\nSo three maids were wooed and won\nIn a brief May-tide,\nLong ago and long ago.\n\nChristina Georgina Rossetti\nMargaret Has A Milking-Pail\n\nMargaret has a milking-pail,\nAnd she rises early;\nThomas has a threshing-flail,\nAnd he’s up betimes.\nSometimes crossing through the grass\nWhere the dew lies pearly,\nThey say ‘Good morrow’ as they pass\nBy the leafy limes.\n\nChristina Georgina Rossetti\nMARVEL of marvels, if I myself shall behold\nWith mine own eyes my King in His city of gold;\nWhere the least of lambs is spotless white in the fold,\nWhere the least and last of saints in spotless white is stoled,\nWhere the dimmest head beyond a moon is aureoled.\nO saints, my beloved, now mouldering to mould in the mould,\nShall I see you lift your heads, see your cerements unroll'd,\nSee with these very eyes? who now in darkness and cold\nTremble for the midnight cry, the rapture, the tale untold,—\nThe Bridegroom cometh, cometh, His Bride to enfold!\n\nCold it is, my beloved, since your funeral bell was toll'd:\nCold it is, O my King, how cold alone on the wold!\n\nChristina Georgina Rossetti\nMaude Clare\n\nOut of the church she followed them\nWith a lofty step and mien:\nHis bride was like a village maid,\nMaude Clare was like a queen.\n\n“Son Thomas, ” his lady mother said,\nWith smiles, almost with tears:\n“May Nell and you but live as true\nAs we have done for years;\n\n“Your father thirty years ago\nHad just your tale to tell;\nBut he was not so pale as you,\nNor I so pale as Nell.”\n\nMy lord was pale with inward strife,\nAnd Nell was pale with pride;\nMy lord gazed long on pale Maude Clare\nOr ever he kissed the bride.\n\n“Lo, I have brought my gift, my lord,\nHave brought my gift, ” she said:\nTo bless the hearth, to bless the board,\nTo bless the marriage-bed.\n\n“Here’s my half of the golden chain\nYou wore about your neck,\nThat day we waded ankle-deep\nFor lilies in the beck:\n\n“Here’s my half of the faded leaves\nWe plucked from the budding bough,\nWith feet amongst the lily leaves, -\nThe lilies are budding now.”\n\nHe strove to match her scorn with scorn,\nHe faltered in his place:\n“Lady, ” he said, - “Maude Clare, ” he said, -\n“Maude Clare, ” – and hid his face.\nShe turn’d to Nell: “My Lady Nell, \nI have a gift for you; \nThough, were it fruit, the blooms were gone, \nOr, were it flowers, the dew.\n\n“Take my share of a fickle heart, \nMine of a paltry love: \nTake it or leave it as you will, \nI wash my hands thereof.”\n\n“And what you leave, ” said Nell, “I’ll take, \nAnd what you spurn, I’ll wear; \nFor he’s my lord for better and worse, \nAnd him I love Maude Clare.\n\n“Yea, though you’re taller by the head, \nMore wise and much more fair: \nI’ll love him till he loves me best, \nMe best of all Maude Clare.\n\nChristina Georgina Rossetti\nMay\n\nI cannot tell you how it was,\nBut this I know: it came to pass\nUpon a bright and sunny day\nWhen May was young; ah, pleasant May!\nAs yet the poppies were not born\nBetween the blades of tender corn;\nThe last egg had not hatched as yet,\nNor any bird foregone its mate.\n\nI cannot tell you what it was,\nBut this I know: it did but pass.\nIt passed away with sunny May,\nLike all sweet things it passed away,\nAnd left me old, and cold, and gray.\n\nChristina Georgina Rossetti\nMemory\n\nI\n\nI nursed it in my bos", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": " in our memories. It was one of his odd habits at the family table. If there was something that Tom wanted which happened to be out of his reach he never bothered to ask for it. He would simply stand up in his place at the table, reach across the table and spear it with his fork. If it happened to be fat meat, it might\ndrip all the way across to his plate. But it did not seem so bad in those days, for most women used oil-cloth instead of table cloths.\n\nTom would do the same thing at anybody's house when he would be there helping to thrash or raise a barn. We thought it was funny and we children used to mock him when the old folks were away and nobody was looking. \"Tommin'\" we called it. And I never to this day see anybody make a long reach at the table without thinking of Old \"By Goll\" Tom Darbyshire.\n\nThen there was John Conklin, bellwether of the Baptist church. John always raised all the money to pay the preacher and served as Sunday School superintendent for forty years. He always talked very proper, and always ate with napkins, glass goblets and pearl-handled knives and forks on the table. When his boys grew older they persuaded him to change the spelling to Conkling because they thought it looked more impressive that way.\n\nOne thing gave John a strange appearance, and came from his habit of always wiping his mustache the same way, from left to right. In time it got to growing that way. Generally a mustache parts in the middle and sprangles off evenly both ways. But John's mustache all headed toward his right ear. We got used to it of course, and John would have looked queer to us any other way. They were fine folks, of course, but there was a general feeling that maybe they thought themselves a little above common folks.\n\nJohn Tucker was our neighborhood mystery man.\nMystery surrounded his whole family, for nobody was ever able to get acquainted with any of them. The Tuckers never mixed with the rest of us to any great extent. Neighborhood gossips whispered that Tucker was a bootlegger and the Funk boys, his immediate neighbors on the west, always claimed he acted like a detective. A good many people were afraid that some day Tucker would break loose and harm someone.\n\nOnce our folks saw him digging a hole in his field along a line fence. This started the rumor that he might have murdered someone and was disposing of the body. Late that night several neighbors gathered, went to the spot and dug into the fresh dirt, but they couldn’t find a trace of anything suspicious. That only deepened the mystery!\n\nPete Funk was another mysterious figure. As far back as I can remember he had been kept locked up in his bedroom, because of insanity. All of us youngsters were afraid Pete might get loose and catch us. Whenever we saw a man walking alone through the fields we ran for home, fearing that it was Funk.\n\nPete had three boys, Pete, Henry and Lou. They were good, honest and hard working German boys, but they had an odd manner of using their breath as they talked. Ordinarily people talk with just the breath that is going out, but the Funk boys used it both ways — perhaps to save it, maybe.\n\nHenry once told of a hunting exploit when he fired a shot that killed a brant and two or three ducks. \"The other boys shot and shot,\" he said, \"but they didn’t\nkill anything. I shot and killed a brant and two ducks.” Up to the word brant he spoke normally, using the outgoing breath, but he finished the sentence from there on while inhaling. Try that yourself and see how funny it sounds. One of our steady sources of amusement was to engage the Funk boys in conversation to watch them do double duty with their breath.\n\nWe had two men in our school district by the name of Oberman. Both were John Oberman and heads of families. True to country form we invented means of telling them apart. One we called “High John” Oberman because he claimed to be high German and the other we called “Dried-Up Johnny” Oberman because he was so little and skinny. High John was an educated German who had escaped from the Fatherland in disguise and we confidently waited for the time when he would be hauled back for service in the German army. His sober countenance and his fine manners put him pretty high. He could have been elected to any office up to Justice of the Peace, I imagine. But he never seemed to have any hankering for public office.\n\nDried-Up Johnny raised his family on a rough and hilly farm at the edge of the tall timber. They were pretty poor and their children sometimes came to school with pretty slim lunches. But Dried-Up Johnny had a way of curing meat that made it taste wonderful. I can recall to this day the smell of that dried meat the kids sometimes brought to school. Then sometimes we would trade our common fodder for a bite of that dried meat. Oh, but it was good! We could taste it for hours\nand we learned not to take a drink of water for the rest of the day, just so we could keep that good taste.\n\nOver behind our fields in a clapboard shanty lived an interesting family by the name of Perkins. We never heard the old man's Christian name, he was just called Perkins. He had a fat, soft and shabby appearing wife and several scarecrow-like children. They were a shiftless lot with too great a fondness for hunting and fishing ever to amount to much. They always had three or four dogs, a couple of old guns, an old grey mare, a one-horse democrat and several stands of bees— that was about all. The old man used to hire out for wages at harvest and corn picking time for a few dollars to live on. Just how they managed to get along nobody knew.\n\nOld man Perkins had a habit of disappearing for sometimes as long as ten days or two weeks, but his family seemed to get used to it and never worried about it. His children never seemed to care very much for him, maybe because he was always bearded, ragged, lazy and shiftless.\n\nOnce he tried to find out from his son Jeff how he stood in comparison with a dog they owned.\n\n\"Jeff,\" he asked, \"If I should take Watch and go away off, and be gone for a considerable spell, which would you be lonesomest for, me or Watch?\"\n\n\"I'd druther see Watch,\" said Jeff.\n\nOne winter night there was a loud knocking at our front door. Pap, who was always a light sleeper, jumped out of bed to see who was there at that time of night.\nWe heard him say, \"Why hello, Jeff, what in blazes you doin' here this time of night?\" Jeff replied that he had come to borrow a saw.\n\n\"Borrow a saw!\" said Pap in great surprise. \"What in the world do you need of a saw in the middle of the night?\" Jeff stammered that they wanted it to cut the hatchway bigger, that the old man was caught tight in it and they couldn't get him down.\n\nBy this time we boys had our duds on and were ready for an adventure. Pap got the saw and we hurried across the field to the Perkins shanty. A dim tallow candle shone through the front window as we approached.\n\n\"What's up?\" Pap asked of Mrs. Perkins when she opened the rickety door.\n\n\"We found Pa dead in the loft,\" the old lady replied, \"and we been tryin' to get him down. He's been gone ten days I reckon, but we didn't think nothing of that, he bein' gone that way a lot. But yisteday I snifted something not jest right in the house, and tonight it got so bad I sent Jeff up into the loft to see what he could find out. And there lay Pa as dead as a mackerel.\"\n\n\"Well, well, well,\" Pap said, and then the old lady went on: \"So the boys commenced right away to git him down, and did git him part way through the hatchhole, but he was puffed up some, you see, and one arm kinder ketched back someway, and he stuck tight right where he is now.\"\n\nIt was a mess. Pap climbed up on a stool and sawed several boards off, and we all got hold and hefted\nthe old man to the floor. There was no such thing as an undertaker in those days, so Pap laid out the corpse on some boards laid across a couple of chairs. Then he offered to take the old lady and the children home with him for the night. It was arranged that two of us boys were to stay at the Perkins’ cabin to watch the corpse. So the old lady washed out a pair of woolen socks and hung them before the fireplace to dry and asked us to slip them on Pa when they got dry.\n\nIt was kinda creepy sitting away over there back of the fields, off the main road, in the flicker of a tallow candle in the middle of the night and with a dead man for company. But we never blinked and sleep was the farthest from our minds. We kept pretty still somehow – stiller than you would think boys could be. After quite a spell of that we got an idea. Frank suggested that we might as well put the old man’s socks on now. Being dead he wouldn’t catch cold and what was the difference. I agreed that I could see no difference so we got the wet socks and commenced to put them on.\n\nNow anybody who has tried to put wet socks on knows that they go on hard. We pulled and tugged and finally upset the contraption he was laid on and his body plumped right down on the floor. After", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": "2 (51%) are significantly associated with either of the two word orders at $\\alpha = 0.05$. In the analysis where only particle verbs were filtered, the percentage was 59%. There is still a clear tendency for verbs to have significant lexical associations, even within the class of verb clusters with *hebben*. If a Bonferroni correction is applied, the corrected value is $0.05/218 = 0.000229$. Under this condition, 56 verbs (25.69%) have significant associations.\n\n### 5.5. Additional semantic analysis\n\nEven though I have now controlled for various factors in my computation of the association values, there are more general properties of the main verbs that might account for part of the associations, besides lexical preference.\n\nIn a collostructional analysis, the top collexemes for each construction are usually analyzed semantically. The verb cluster orders are generally considered to express no semantic difference and, therefore, I have no specific hypothesis on any possible semantic association of each word order to test. The claim of Pardoen (1991), who suggested a *Stative* versus *Dynamic* interpretation distinction, should be tested, however. Because of this, I decided to take an objective approach by using semantic properties of Dutch verb senses from the Cornetto lexical-semantic database (Vossen et al. 2013), which includes *Dynamic* as a feature. Unfortunately, the Lassy Large corpus is not annotated for word senses so I had to take the properties of the most common senses of each verb, as judged by a native speaker. If there were multiple commonly used senses with conflicting properties, the verb was annotated for both properties.\n\nI performed this annotation for the top 20 collexemes of each word order from the analysis in the previous section (shown in Table 3). The results are summarized in Table 4. It lists all of the semantic features from the Cornetto database, as well as the polarity property. I list the description of each feature below, taken from the user documentation (Maks et al. 2013):\n\n- **Valency**: the number of arguments of the verb\n- **Transitivity**: whether a verb can take direct objects, and how many\n- **Control**: the subject of the verb is capable of acting with volition\n• **Dynamic**: the verb expresses a non-static, changing situation\n\n• **Attributive**: the verb expresses a relation of ownership\n\n• **Spatial**: the verb expresses a location or movement of (one of) the participants\n\n• **Cognition**: the verb demands emotional, perceptual or mental activity\n\n• **Polarity**: what kind of attitude the word’s most common senses express\n\nThe polarity property was annotated on the basis of an automatic sentiment analysis system, so there may be some errors in the annotation of this property in the database.\\(^8\\)\n\n
\n\n
\n
Property
\n
Values
\n
1-2 order
\n
2-1 order
\n
\n\n\n
\n
Valency
\n
Mono
\n
0
\n
4
\n
\n
\n
\n
Di
\n
10
\n
12
\n
\n
\n
\n
Tri
\n
11
\n
6
\n
\n
\n
Transitivity
\n
Intransitive
\n
5
\n
5
\n
\n
\n
\n
Transitive
\n
16
\n
17
\n
\n
\n
\n
Ditransitive
\n
4
\n
0
\n
\n
\n
Control
\n
+CONTROL
\n
16
\n
15
\n
\n
\n
\n
-CONTROL
\n
6
\n
6
\n
\n
\n
Dynamic
\n
+DYNAMIC
\n
16
\n
17
\n
\n
\n
\n
-DYNAMIC
\n
6
\n
4
\n
\n
\n
Attributive
\n
+ATTRIBUTIVE
\n
1
\n
0
\n
\n
\n
\n
-ATTRIBUTIVE
\n
19
\n
20
\n
\n
\n
Spatial
\n
+SPATIAL
\n
1
\n
0
\n
\n
\n
\n
-SPATIAL
\n
19
\n
20
\n
\n
\n
Cognition
\n
+COGNITION
\n
2
\n
6
\n
\n
\n
\n
-COGNITION
\n
19
\n
14
\n
\n
\n
Polarity
\n
NEGATIVE
\n
3
\n
8
\n
\n
\n
\n
POSITIVE
\n
3
\n
1
\n
\n\n
\n\n*Table 4: Frequency count of semantic properties of the top 20 words in each word order*\n\nFor each semantic feature, I counted how many of the top 20 collexemes for each order have this feature. The counts do not always add up to 20 because a verb may have multiple frequent senses with conflicting properties, in which case they were counted as having both features. We can observe that the counts for the 1-2 and 2-1 order are quite similar for most features, which indicates that there are no meaning associations of those features with a particular word order. Based on Pardoen’s (1991) claim that 1-2 orders are assigned a dynamic interpretation while 2-1 orders get a stative interpretation, we might expect to see a difference in the number of verbs\n\n---\n\n\\(^8\\) I noticed a few possible errors, for example, the first sense of *slapen* ‘to sleep’ is annotated as having negative polarity\nwith the **Dynamic** feature between the two orders. This is not the case however — there is one more **Dynamic** verb in the 2-1 order, a negligible difference.\n\nOne notable difference can be observed for the **Polarity** property. By just looking at the verbs on the right-hand side of Table 3 one may already get the impression that many of the verbs associated with the 2-1 order have a somehow negative sense. The semantic analysis in Table 4 confirms this, listing 8 negative verbs for the top 2-1 order verbs, and just three for the top 1-2 order verbs. There are also slightly more positive 1-2 verbs. Another difference is in the **Cognition** verbs, of which there are more for the 2-1 order. There was only one verb with the **Attributive** feature and one with the **Spatial** feature in either of the top 20 collexeme lists, which were both in the 1-2 order list.\n\nA further difference can be observed in the **Valency** and **Transitivity** counts: among the 2-1 order verbs we find four verbs that take only a subject argument while the 1-2 order list has no such verbs. On the other hand, the 1-2 order list features four ditransitive verbs while the 2-1 order list has none.\n\nIn summary, it appears that there are a few semantic features that are more common among verbs that are strongly associated with one order, compared to the other. The negative polarity property is the clearest of these differences, however, even there it is only a tendency — there are also many neutral verbs and even a positive verb among the top 1-2 order collexemes, and there are negative verbs among the top 2-1 collexemes as well.\n\nLastly, it is interesting that there are some similar verbs in the overall list of collexemes that are positioned adjacent to each other. An example of this can be seen in Table 3, where the bottom two verbs in the 1-2 order list are the verbs for ‘give’ and ‘take’. In the 2-1 order list the bottom verb is ‘eat’ with rank 20, and in the 21st position I found *drinken* ‘to drink’. It appears that at least some semantically similar verbs have very similar cluster order associations.\n\n### 6. Discussion\n\nI have calculated lexical associations between main verbs and their word order in clusters, and found that significant associations are quite common. A majority of the verbs are significantly associated with either the 1-2 or 2-1 word order in the corpus that I used, even after controlling for various confounding factors. I found that the two word orders exhibit some distinct semantic preferences, but not to such an extent that all of the associations can be explained in this way.\n\nThis result indicates that verb cluster word order associations are", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-literature", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-literature/part-00-00000.npy", "text": ", though a Trinitarian (i.e. *ad norman Platonis*) in philosophy, yet a zealous Unitarian in Religion.” However, an examination of the notebooks reveals that this three-part thinking is better placed as starting in 1801, after he had returned from Germany and after the focus of his reading had shifted to Idealism, Neoplatonism and mysticism. Coleridge continued to develop it as he worked on his *Logic*, and most fully elaborated it into a philosophical phenomenology in his incomplete *Opus Maximum* manuscripts.\n\nThe underlying difference between these two approaches was between reason and the understanding. The empirical dyadic model operated upon the understanding alone. This faculty deals with the individual’s experience of the world, taking that which is furnished by the senses, and classifying and generalizing it into comprehensible impressions. It analyzes and abstracts\n\n---\n\n100 Kant makes this argument for concepts of the understanding at A93/B125 in the first *Kritik*.\n102 BL I, 179-80.\nwhat would otherwise be the chaos of experience into cause and effect.\\textsuperscript{106} It is, Coleridge explains, “the power of imagining the shortest possible line between two points,” the logic of association or causal connection.\\textsuperscript{107} Alternately, reason is a faculty that is associated with this third logical term, “bearing the same relation to spiritual objects, the Universal, the Eternal, and the Necessary, as the eye bears to material and contingent phenomena.”\\textsuperscript{108} That is to say, reason is concerned with that which an individual is conscious of in an intuitive, super-sensory manner, most notably moral intuition in contrast to the cause and effect of the understanding.\\textsuperscript{109} It is “the power of the universal… the Source and Substance of Truths above Sense.” Furthermore, “it is an organ identical with its appropriate objects. Thus, God, the Soul, eternal Truth, &c. are the objects of reason; but they are themselves reason.”\\textsuperscript{110} In the sense Coleridge describes, reason is the “representative of the infinite” invested in the finite nature of the individual.\\textsuperscript{111}\n\nColeridge argues that reason is dependent upon the understanding for its expression. The understanding can exist without reason, yet when it does so, as illustrated by Hume, it has no sense of itself apart from experience. Coleridge explains the relationship as follows:\n\nUnderstanding and Experience may exist without Reason. But Reason cannot exist without Understanding; nor does it or can it manifest itself but in and through the understanding, which in our elder writers is often called discourse, or the discursive faculty, as by Hooker, Lord Bacon, and Hobbes: and an understanding enlightened by reason Shakespeare gives as the contra-distinguishing character of man, under the name discourse of reason. In short, the human understanding possesses two distinct organs, the outward sense, and “the mind’s eye” which is reason….. In this way we reconcile the promise of Revelation, that the blessed will see God, with the declaration of St. John, God hath no one seen at any time.\\textsuperscript{112}\n\nIn this passage, Coleridge makes two important claims about his tripartite epistemology. The first refers back to Coleridge’s Hegel-like conception of\n\n\n\\textsuperscript{107} OM, 6.\n\n\\textsuperscript{108} F, I, 155-56.\n\n\n\\textsuperscript{110} F, I, 155-56.\n\n\\textsuperscript{111} OM, 87.\n\n\\textsuperscript{112} F, II, 156–7.\nhis own system, that is, it “opposes no other system, but shows what is true in each.”\\textsuperscript{113} Here the great British Empiricists are not enemies, but allies in the expression of reason. This brings up the second claim of this passage, that it is through the articulation of the understanding that the transcendence of God which no one can see is reconciled with the promise of revelation, and this occurs through the symbol.\n\nThroughout Coleridge’s writings, there is an interest in the question of how an idea becomes something that can be more or less objectively communicated. For Coleridge, an idea is supersensuous in that it arises mentally, not from sensuous experience. As a result “an idea in the highest sense of that word, cannot be conveyed but by a symbol.”\\textsuperscript{114} All language engages in moving an idea from internal subjectivity to discursive objectivity: “all language is utterance, i.e. Outer-ance, and with Outness the imagination necessarily associates a sensation of reality [with it].”\\textsuperscript{115} The result of this is a symbol which is the combination of both reason and the understanding. The symbol acts, Coleridge explains, as a “reconciling and mediatory power, which incorporating the Reason Images of the Sense, and organizing (as it were) the flux of the Senses by the permanence and self-circling energies of Reason, gives birth to a system of symbols, harmonious in themselves, and consubstantial with the truth, of which they are conductors.”\\textsuperscript{116}\n\nThat symbols are “consubstantial” brings the model of the Trinity directly into play. The Son is consubstantial with the Father in that they are of one and the same substance. Just as Christ is the incarnation of God, the symbol is the incarnation of the idea. Furthermore, just as Christ as Logos is God’s creative presence in the world, the symbol is the individual’s creative presence in the world for Coleridge. Finally, what makes this possible is the imagination, which Coleridge famously defines as “a repetition in the finite mind of the eternal act of creation in the infinite I AM,” meaning that just as God has the power of self-creation (the “I will be what I will be” of Exodus 3:14) the imagination has the power of self-creation in asserting the ideas of reason which have their source in the activity of the self, not the passivity of experience.\\textsuperscript{117} “Symbols,” Coleridge writes, “are the translucence of the Eternal through and in the Temporal. It always partakes of the Reality which it renders intelligible; and while it annunciates the whole, abides itself as a\n\n\\textsuperscript{113} TT, II, 147.\n\\textsuperscript{114} BL, I, 156.\n\\textsuperscript{115} OM, 312.\n\\textsuperscript{117} BL, I, 304.\nliving part in that Unity, of which it is the representative.”\\textsuperscript{118} In this manner, the transcendent reality of ideas share in a community of ideas with the temporal world of the understanding, their “outer-ance” allowing them to be the subject of objective discourse.\n\nYet they are not fixed, though they are always consubstantial with the transcendent ideas of reason, their expression in the understanding is subject to flux: “We can neither rest in an infinite that is not at the same time a whole, nor in a whole that is not infinite. Hence the natural Man is always in a state either of resistance or of captivity to the understanding, which cannot represent totality without limit.”\\textsuperscript{119} It is in this way that Coleridge reconciles the promise of revelation and the invisibility of God. Religion is therefore best expressed in a genre that forms a symbolic system that engages in a process of endless striving. “Christianity,” Coleridge writes, “is not a Theory, or a Speculation; but a Life. Not a Philosophy of Life, but a Life and living Process.”\\textsuperscript{120}\n\n6. Conclusion\n\nThis examination moves from the pre-Romantic lives of Coleridge and Schlegel, only to the development of the early forms of their Romantic thought. It demonstrates the fascinating correspondence between their two parallel lives. These concurrent developments would continue as both thinkers moved into the mature stages of their Romantic thought. For Schlegel, this can be located in many of the lectures he delivered later in his life when resident in Vienna. Particularly in his development of a Lebensphilosophie, which elaborates and distills many of the early elements discussed here into a practical philosophy. This is reinforced in his other later lectures which consider literary genres and the dialogical character of the nature of language.\\textsuperscript{121} For Coleridge, this is especially true of the triune logic which he articulates as a systematic framework in his Opus Maximum, particularly in fragment three, which takes up the realist tradition of the divine ideas and their relation to creation, and fragment two, which examines the ethical grounding for personhood in the Absolute.\\textsuperscript{122} In the case of both thinkers, these later developments have often been unfairly characterized as a\n\n\\textsuperscript{118} LS, 30.\n\\textsuperscript{119} LS, 60.\n\\textsuperscript{120} AR, 2.\n\\", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "cuts any in-the-presence legal\nrequirement for Marian witness examinations. If there had\nbeen such a rule, one would expect that Burn would have said\nsomething about the need to retrieve the defendant and bring\nhim in at the same time as the material witness, but Burn did\nnot say that. The material witness form still appears at least\nas late as the 1797 edition of Burn’s manual.109\n\nBurn’s manual is especially relevant because the justice\nof the peace manuals published in America prior to the framing\nborrowed heavily from it. The principal manuals reprinted his\npassages on Marian procedure as well as the accompanying\nforms for witness examinations and material witnesses.110\n\n---\n\n106 1 BURN, supra note 105, at 295-97 (1755 ed.) (discussing Marian\nprocedure); 1 id. at 536-38 (1785 ed.) (same); 1 id. at 671-73 (1797 ed.) (same).\n\n107 1 BURN, supra note 105, at 297 (1755 ed.) (setting out forms for\nexamination of prisoner and information of witnesses); 1 id. at 538 (1785 ed.) (same); 1\nid. at 673-74 (1797 ed.) (same).\n\n108 1 BURN, supra note 105, at 298-99 (1755 ed.) (setting out form for material\nwitness warrant); 1 id. at 539-40 (1785 ed.) (same).\n\n109 1 BURN, supra note 105, at 675 (1797 ed.) (setting out same form for\nmaterial witness warrant as in previous editions).\n\n110 Several American manuals closely tracked Burn’s manual. See JOSEPH\nGREENLEAF, AN ABRIDGMENT OF BURN’S JUSTICE OF THE PEACE AND PARISH OFFICER\n118 (Boston 1773) (reprinting Burn’s discussion of Marian procedure and forms); JOHN\nFAUCHERAUD GRIMKE, THE SOUTH-CAROLINA JUSTICE OF PEACE 199-202 (Phila. 1788)\nThe consistent silences in the framing-era authorities are powerful evidence of the “dog-that-did-not-bark-in-the-night\" sort that there was no in-the-presence rule for Marian examinations. However, there is more evidence than silence. Several framing-era authorities juxtaposed Marian witness examinations to depositions in civil lawsuits which were subject to a cross-examination rule.\n\n2. Contrasting Treatments of Marian Procedure and Civil Litigation Deposition Procedure\n\na. Gilbert’s Treatise\n\nChief Baron Geoffrey Gilbert authored a leading treatise, The Law of Evidence.111 As I pointed out in my prior article, he contrasted Marian examinations to the cross-examination rule that applied in non-Marian depositions in a passage regarding the implications of the 1696 ruling in King v. Paine112 by writing that the judges in that misdemeanor libel trial “would not allow the Examinations . . . to be given in Evidence, because Paine was not present to cross-examine [when the deposition at issue was taken], and tho’ tis Evidence in Indictments for Felony in such Case, by Force of [the Marian statutes], yet ‘tis not so in Informations for Misdemeanors . . . .”113 In other words, a Marian witness examination was admissible as “Evidence” in a felony trial regardless of cross-examination, but a deposition was...\ninadmissible in a misdemeanor trial (to which the Marian statutes did not apply) unless the defendant had had an opportunity to cross-examine the deponent. That statement appeared in later editions, including the 1788 American edition of Gilbert’s treatise, and was still unaltered as late as the expanded and updated 1791 London edition.114\n\nGilbert also implicitly drew a contrast between civil lawsuit depositions and Marian witness examinations when he explicitly noted that an opportunity for cross-examination was required in the former, but made no comparable statement about the latter.115 Gilbert’s contrasting treatment was also echoed in later works.\n\nb. The Theory of Evidence\n\nAnother evidence treatise, The Theory of Evidence, was published anonymously in London in 1761.116 This treatise stated that a deposition could be admitted into evidence in a variety of civil proceedings if, but only if, the other party had been given an opportunity to cross-examine when the deposition was taken. However, when this treatise discussed the admissibility in felony trials of Marian witness examinations taken by coroners or justices of the peace, it simply stated that Marian witness examinations could be admitted in evidence if the witness had become unavailable. The contrasting treatment is especially evident because this treatise connected these two subjects with the disjunctive “yet”:\n\nIt is a general Rule, that Depositi ons taken in a Court not of Record shall not be allowed in Evidence elsewhere. So it has been holden in Regard to Depositions in the Ecclesiastical Court, though the Witnesses were dead. So where there cannot be a cross Examination, as Depositions taken before Commissioner of Bankrupts, they shall not be read in Evidence, yet if the Witnesses examined on a Coroner’s Inquest are dead, or beyond Sea, their Depositions may be read; for the Coroner is an Officer appointed on behalf of the Public, to make Inquiry about the Matters within his Jurisdiction; and therefore the Law will presume the Depositions\n\n114 Davies, supra note 2, at 145-46.\n115 Compare Gilbert, supra note 15, at 46-47, 48 (1754 ed.) (indicating that an opportunity for cross-examination was a requirement for a deposition in civil lawsuits), with id. at 100 (1754 ed.) (not mentioning cross-examination regarding Marian examinations).\n116 Henry Bathurst, The Theory of Evidence (Dublin 1761). There was no later edition of this work, which, though originally published anonymously, is now attributed to Henry Bathurst. See 1 Maxwell, supra note 4, at 378.\nbefore him to be fairly and impartially taken.—And by [the Marian statutes] Justices of the Peace shall examine of Persons brought before them for Felony, and of those who brought them, and certify such Examination to the next Gaol-Delivery; but the Examination of the Prisoner shall be without Oath, and the others upon Oath, and these Examinations shall be read against the Offender upon an Indictment, if the Witnesses be dead.117\n\nThe contents of The Theory of Evidence, including the above passage, were subsequently restated in a 1767 treatise, An Introduction to the Law Relative to Trials at Nisi Prius,118 which I quoted in my previous article.119 The quoted passage then appeared in later editions of the Nisi Prius treatise that were published as late as 1793, including a New York edition published in 1788.120\n\nc. Burn’s Justice of the Peace Manual\n\nBurn’s leading English justice of the peace manual similarly contrasted Marian examinations in felony prosecutions with depositions in civil lawsuits. In addition to the description of Marian procedure noted above,121 Burn also discussed the admissibility of depositions in civil proceedings and the admissibility of Marian witness examinations of unavailable witnesses in a subpart of his entry for “Evidence” headed “Of written evidence.” In that discussion, Burn also contrasted the rule that an opportunity for cross-examination was a condition for admitting a deposition in a civil lawsuit to the admissibility of Marian witness examinations of unavailable witnesses.\n\n117 BATHURST, supra note 116, at 33-34 (emphasis added). Kry concedes that the “yet” in the quoted passage “arguably” applies to Marian committal examinations as well as to coroners’ examinations, but suggests that it might apply only to coroners’ examinations. See Kry, supra note 3, at 500 n.28.\n\n118 HENRY BATHURST, AN INTRODUCTION TO THE LAW RELATIVE TO TRIALS AT nisi prius (n.p. 1767). The incorporation of the contents of The Theory of Evidence into the Nisi Prius treatise and other later treatises was well known. See BRIDGMAN, supra note 105, at 230-31 (noting that the contents of The Theory of Evidence were “generally understood to have been engrafted on” the Nisi Prius treatise); 1 MAXWELL, supra note 4, at 378 (entry 1) (The Theory of Evidence incorporated into An Introduction to the Law Relative to Trials at Nisi Prius); 1 MAXWELL, supra note 4, at 335 (attributing the 1767 edition of the Nisi Prius treatise—first published anonymously—to Henry Bathurst and the 1772 edition to Francis Buller).\n\n119 Davies, supra note 2, at 151 n.", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "1 3DG\nwww.gov.scot<|endoftext|>Terre des Hommes position on child labour\n\nOn 25 September 2015, Heads of State from 193 countries launched the Post-2015 Global Development Agenda, adopting 17 Sustainable Development Goals (SDGs) and 169 specific targets to be implemented worldwide over a decade and a half – 2015 to 2030.\n\nTargets 8.7 and 16.2 direct focus is on eliminating the worst forms of child labour by 2025:\n\n- **Goal 8.7** Take immediate and effective measures to eradicate forced labour, end modern slavery and human trafficking and secure the prohibition and elimination of the worst forms of child labour, including recruitment and use of child soldiers, and by 2025 end child labour in all its forms;\n\n- **Goal 16.2.** End abuse, exploitation, trafficking and all forms of violence against and torture of children.\n\nOur work to end the worst forms of child labour, contributes directly to the Sustainable Development Goals.\n\nTerre des Hommes believes that all worst forms of child labour should be abolished and that no child (every person below the age of 18, pursuant to the Convention on the Rights of the Child (CRC)) should be involved in hazardous and exploitative forms of child labour, as defined in ILO 182. The mission of Terre des Hommes is that the rights of children and their families are respected, so that vulnerable children can develop to their full potential in a safe family environment, in an atmosphere of happiness, love and understanding. Terre des Hommes works to create a world in which all children can have a humane existence and can grow up to be independent adults. Therefore Terre des Hommes is fighting to protect children from exploitation and violence in the framework of the Convention on the Rights of the Child, and ILO Conventions 29, 138, 182, 189.\n\nIn its fight against child labour, Terre des Hommes makes a distinction between child work and child labour, and gives top priority to eradicating the latter. Child work refers to the participation of children in any paid or unpaid economic activity, or activities to support families and family care givers which is not detrimental to their health and mental and physical development. It is light work for a limited amount of hours, according to their age and abilities, that doesn’t interfere with a child’s education or leisure activities. This work can even be seen as beneficial for the child’s development. For example: Girls and boys support their parents and at home they learn the basic skills of housekeeping; by helping out in their parents’ business they learn different mechanical skills or farming techniques and they impart important social values, e.g. cooperation and community commitment.\n\nOn the contrary, child labour refers to all kinds of labour which jeopardize a child’s physical, mental, educational or social development. Hazardous child labour is prohibited for all children, in line with Convention 182 on the worst forms of child labour. Child labour in dangerous jobs, such as with toxics and dangerous substances, in prostitution and bonded labour should be directly eliminated.\n\nTerre des Hommes fights child labour with an integrated approach consisting of policy influencing activities, awareness-raising and prevention - like education, health care and socio economic development - and direct assistance to victims of child labour and exploitation.\nIf no other alternatives are available, or if children are not willing or able to stop all their working activities immediately, Terre des Hommes ensures working children with a parallel school attendance. We don’t disapprove evening schools, but only insofar as no other alternative can be offered to children and their families.\n\nTerre des Hommes strives to an immediate improvement of labour standards and the regulation of working hours for adolescent children to decrease the direct danger for a child’s health and development. Work in decent conditions (e.g. safe working environment, maximum working time, and fair wages) in combination with education is the first step towards our goal of eliminating child labour.\n\nTerre des Hommes does not believe that a boycott of products made with child labour can be a single solution for abolishing child labour. An overall ban will not change any of the social and economic needs, which compel children to enter into employment. Trade measures should therefore always be combined with poverty reduction strategies, social and economic development aid, alternatives for child labourers and their families and the enforcement of labour laws and decent wages for adult workers.\n\n**Terre des Hommes promotes nine recommendations to eradicate child labour exploitation**¹\n\n1. **Coordinate the work being done**\n Fighting against child labour exploitation is a collective responsibility that rests primarily with the government, but social partners, Trade Unions, corporate sector, civil society, international organisations, families and the communities affected also have a role to play.\n\n2. **Apply international conventions**\n A very large number of the world’s States have ratified ILO Conventions 182 and 138, the key pillars in fighting child labour exploitation. Nevertheless, in many cases, the articles are not implemented nor enforced on a local level. A collective effort of all stakeholders and pragmatic, realistic solutions that correspond to local contexts and the labour market are necessary.\n\n3. **No impunity for child rights violations**\n Those responsible for exploiting children must be prosecuted and convicted of criminal offences.\n\n4. **Implement a holistic approach**\n The fight against child labour exploitation involves the implementation of long-term targeted legislation and public policies. However, it must also be integrated into the framework of a wider strategy and systematic approaches for child protection, because of the strong existing interconnections between the different causes of exploitation. The children’s individual needs and opinions must be taken into account. The proposed solutions must be adapted to the situations and contexts encountered.\n\n¹ Referring to General Comments 14 (best interests of the child) , 15 (right to health) and 16 (impact of business sector on children’s rights) of the Committee on the Rights of the Child\n5. **Guarantee access to education**\nGuaranteeing access to education for all children is the best way to prevent children from premature work and exploitation and strengthen their capacities to protect themselves against abuse. School is also a fundamental tool for supporting working children, including child domestic workers, provided that the educational system can be adapted if necessary to meet the needs of specific professions and guarantee effective access (modular courses, half-day attendance, etc.).\n\n6. **Implement individualised measures**\nAssisting and protecting children identified as exploited requires the implementation of realistic alternatives accompanied by access to basic services, a healthy environment and recreational activities. Children must be able to participate in solving their issues and be supported in exercising their rights.\n\n7. **Define the “best interest” of the child**\nThe definition of the best interest of the child is very subjective. Within a working environment, determining the best solution for the child must be based on an analysis of the nature of the job, the working conditions and the respect of child rights, as well as the impact of the workload on the child’s education, health, and physical, mental, spiritual, moral and social development.\n\n8. **Guarantee fundamental rights**\nThe State has the responsibility to respect and uphold the fundamental rights of working children, who must be given the means to voice their opinions. Access to healthcare, sanitary accommodation, decent wages and acceptable working conditions must be ensured.\n\n9. **Promote a responsible economy**\nA dialogue between the private and public sectors should enable the implementation of child protection measures – an integral part of a genuine policy of social responsibility – in formal and informal businesses.<|endoftext|>Republic of the Philippines\nHOUSE OF REPRESENTATIVES\nQuezon City\nEIGHTEENTH CONGRESS\nFirst Regular Session\n\nCOMMITTEE REPORT NO. 161\n\nSubmitted by the Committee on Basic Education and Culture and the Committee on Appropriations on DEC 18 2019.\nRe: House Bill No. 5872\n\nRecommend its approval in substitution of House Bill No. 735.\nSponsors: Representatives Romulo, Ungab and Dalog\n\nMr. Speaker:\n\nThe Committee on Basic Education and Culture and the Committee on Appropriations to which was referred House Bill No. 735, introduced by Rep. Maximo Y. Dalog Jr., entitled:\n\nAN ACT\nSEPARATING THE GUINA-ANG NATIONAL HIGH SCHOOL - MAINIT EXTENSION IN BARANGAY MAINIT, MUNICIPALITY OF BONTOC, PROVINCE OF MOUNTAIN PROVINCE FROM THE GUINA-ANG NATIONAL HIGH SCHOOL CONVERTING IT INTO AN INDEPENDENT NATIONAL HIGH SCHOOL TO BE KNOWN AS MAINIT NATIONAL HIGH SCHOOL AND APPROPRIATING FUNDS THEREFOR.\n\nhave considered the same and recommend that the attached House Bill No. 5872 entitled:\n\nAN ACT\nSEPARATING THE GUINA-ANG NATIONAL HIGH SCHOOL - MAINIT EXTENSION IN BARANGAY MAINIT, MUNICIPALITY OF BONTOC, MOUNTAIN PROVINCE FROM THE GUINA-ANG NATIONAL HIGH SCHOOL, CONVERTING IT INTO AN INDEPENDENT NATIONAL HIGH SCHOOL TO BE KNOWN AS MAINIT NATIONAL HIGH SCHOOL, AND APPROPRIATING FUNDS THEREFOR\n\nbe approved in substitution of House Bill No. 735, with Representatives Dalog, Romulo, Ungab, Cueva, Vergara, Fortuno, Acop, Abueg-Zaldivar, Robes, Abunda, Guico, Mangaon, Barba, Dy (F.M.C.), Umali, Castro (F.L.), Romualdez (Y.M.), Amatong, Zarate, Fernando and Elago as authors thereof.\n\nRespectfully submitted,\n\nISIDRO T. UNGAB\nChairperson\nCommittee on Appropriations\n\nROMAN T.", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "STITUTIONAL LINKAGES SERVICE (ILS)\n\nJulieta J. Cervo, CPA, DPA, CESO \nDirector III/Service Chief\n\nStaff\nRhona Beatriz D. Altomia \nBernardita R. Ampa \nMa. Teresa A. Castillo \nNelson C. Macatangay \nGerardo R. Serrano \nPaulita D. Sulit\n\nThe Institutional Linkages Service is under the External Affairs and Relations headed by Deputy Secretary Peter Paul L. Pineda and Executive Director Diana Lynn Le-Cruz.\nThe Senate Of The Philippines\nAs an Institution\n\nThe Senate of the Philippines is one of the pillars of the country’s lawmaking body, the other one is the House of Representatives. It is composed of 24 elected Senators whose terms of office shall be six (6) years. This dynamic institution is established to balance our economic, social and political environment and whose concerns are national in scope.\n\nAs the bastion of democracy, its action is centered on consensus and consultation with the end purpose of serving the best interest of the Filipino people.\n\nThe SENATE also values the importance of having productive and harmonious relationship with other institutions, from the government and the private sector, to create an environment where rapport and goodwill among institutions prevail. Its main objective is the passage of good, implementable and doable laws in pursuit of democratic ideals that would truly serve the national interest and the welfare of the people.\n\n-Juliet Cervo-\n\"The SENATE LINKAGES CIRCULAR\nVol. 8 no. 3.7, Series of 2010\"\n\nSENATE OF THE PHILIPPINES\nOFFICE OF THE SENATE PRESIDENT\nInstitutional Linkages Service\nRm. 411, 4th Floor, GSIS Building\nFinancial Center, Pasay City\n\nOFFICIAL MAIL\nPenalty for private or Unauthorized Use to Avoid Payment of Postage P500.00 or Imprisonment<|endoftext|>Sponsored by:\nAssemblyman CHRISTOPHER \"KIP\" BATEMAN\nDistrict 16 (Morris and Somerset)\nAssemblyman WILFREDO CARABALLO\nDistrict 28 (Essex)\n\nCo-Sponsored by:\nAssemblymen Asselta, Augustine, Assemblywoman Farragher,\nAssemblymen Merkt, Arnone, Assemblywoman Crecco, Assemblymen\nFelice, LeFevre, B.Smith, Assemblywoman Weinberg, Assemblyman\nWisniewski, Assemblywoman Pou, Assemblymen Zisa, T.Smith,\nAssemblywomen Watson Coleman, Cruz-Perez, Quigley, Assemblyman\nConnors and Assemblywoman Greenstein\n\nSYNOPSIS\nEstablishes the \"New Jersey Individual Development Account Program;\"\nappropriates $5 million.\n\nCURRENT VERSION OF TEXT\nAs introduced.\n\n(Sponsorship Updated As Of: 6/30/2000)\nAN ACT concerning individual development accounts, supplementing parts of the statutory law and making an appropriation.\n\nBE IT ENACTED by the Senate and General Assembly of the State of New Jersey:\n\n1. This act shall be known and may be cited as the \"New Jersey Individual Development Account Act.\"\n\n2. a. The Legislature finds and declares that:\n\n(1) Economic well-being does not come solely from income, spending, and consumption, but also requires savings, investment, and accumulation of assets, since assets can improve economic stability, connect people with a viable and hopeful future, stimulate development of human and other capital, yield personal and social dividends, and enhance the welfare of offspring.\n\n(2) With the enactment of the \"Work First New Jersey Act,\" P.L. 1997, c.38 (C.44:10-55 et seq.) and companion legislation, emphasizing moving people off of public assistance and into employment, there is an urgent need to provide incentives for savings accounts that will compliment and stabilize the movement of people from public assistance and into employment.\n\n(3) Income-based social policy should be complemented with asset-based social policy, because while income-based policies ensure that consumption needs (including food, child care, rent, clothing and health care) are met, asset-based policies provide the means to achieve some degree of economic self-sufficiency.\n\n(4) The State of New Jersey should develop policies, such as individual development accounts, that promote higher rates of personal savings and net private domestic investment.\n\nb. It is the intent of the Legislature, therefore, to provide for the establishment of Individual Development Accounts (IDA's) which accounts are designed to:\n\n(1) provide individuals and families, especially those with limited means, an opportunity to accumulate assets;\n\n(2) facilitate and mobilize savings;\n\n(3) promote education, home ownership and micro enterprise development; and\n\n(4) stabilize families and build communities.\n\n3. As used in this act:\n\n\"Account holder\" means a person who is the owner of an individual development account.\n\n\"Commissioner\" means the Commissioner of Community Affairs.\n\n\"Community development organization\" means any religious or charitable organization, which is a nonprofit corporation incorporated\npursuant to the \"New Jersey Nonprofit Corporation Act,\" N.J.S.15A:1-1 et seq., that is approved by the commissioner to implement the individual development account program, or any community action agency as that term is defined pursuant to subsection c. of section 3 of P.L.1991, c.51(C.52:27D-397).\n\n\"Department\" means the Department of Community Affairs.\n\n\"Economic literacy\" means: a basic understanding of budgets and savings accounts, credit and interest and how to use financial services; and having a savings plan and using it to reach the account holder's savings goal for an individual development account.\n\n\"Eligible individual\" means an individual or a family who earns less than 80 percent of the median income of the county in which the individual or family resides or an individual or family whose net worth does not exceed $10,000 excluding the individual's or family's primary dwelling unit and one motor vehicle.\n\n\"Financial institution\" means a state or federally chartered bank, savings bank, savings and loan association or credit union with an office in this State or an entity which is a member of the Securities Investor Protection Corporation established pursuant to the \"Securities Investor Protection Act of 1970,\" 15 U.S.C. s.78aaa et seq.\n\n\"Fund\" means the Individual Development Account Fund established pursuant to section 4 of this act.\n\n\"Individual development account\" means a financial instrument established pursuant to section 5 of this act.\n\n\"Program\" means the Individual Development Account Program established in this act.\n\n\"Program contributor\" means a person or entity who makes a contribution to an individual development account reserve fund, except that \"program contributor\" does not mean the State or the account holder.\n\n\"Reserve fund\" means the individual development account reserve fund created by a community development organization for the purposes of: funding the costs incurred in the administration of the program; receiving matching funds from the State and other program contributors; and providing matching funds for individual development accounts pursuant to paragraph (6) of subsection b. of section 5 of this act.\n\n4. a. The Individual Development Account Program is hereby established within the Department of Community Affairs. The purpose of this program shall be to provide each eligible individual in this State with an opportunity to establish an individual development account, which may be used by that individual for the any of the purposes specified under subsection a. of section 5 of this act.\n\nb. There is established in the department, the Individual Development Account Fund. This fund shall be used by the\ncommissioner to provide:\n(1) grants to community development organizations selected by the commissioner to participate in the Individual Development Account Program; and\n(2) a State match of two dollars for every one dollar deposited into an individual deposit account, except that the maximum amount provided as a match per individual development account per calendar year shall be $5,000.\n\nc. The commissioner shall implement this program throughout the State by entering into agreements with community development organizations which the commissioner selects pursuant to the provisions of this section. In order to ensure the targeting of areas of high poverty in the State, the commissioner shall use the Community Service Block Grant allocation formula as a guide for distribution of moneys in the Individual Development Account Fund established pursuant to subsection b. of this section.\n\nd. The commissioner shall solicit proposals from community development organizations for the purpose of implementing the Individual Development Account Program. Proposals from community development organizations shall include:\n(1) a plan for the establishment and management of the community development organization’s individual development account reserve fund;\n(2) a plan for the establishment and oversight of individual development accounts;\n(3) specification of the persons targeted for priority participation;\n(4) a detailed description of the economic literacy training that will be required of every account holder;\n(5) a request for funds to be used:\n(a) in establishing and administering the individual development account program for the duration of the program;\n(b) to provide economic literacy training and one-on-one financial counseling for eligible individuals; and\n(c) for the State’s match pursuant to paragraph (2) of subsection b. of this section, the amount of which request shall be reasonably based on the number of persons targeted for individual development accounts and the total amount of savings per year expected of those persons; and\n(6) any other information the commissioner deems important for selecting community development organizations to participate in the Individual Development Account Program.\n\ne. In reviewing the proposals of community development organizations, the commissioner shall consider the following factors:\n(1) the not-for-profit status of the community development organization;\n(2) the fiscal accountability of the community development\norganization;\n\n(3) the ability of the community development organization to\nprovide its moneys or raise moneys from program contributors for\nmatching contributions which are in addition to State", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": ". Vincent Pepito F. Yambao, Jr. (Director, Civil Liberties and Human Rights Desk).\n² On 23 November 2009, while on their way to file the certificate of candidacy for Esmael Mangudadatu, vice mayor of Buluan town, the 57 victims were kidnapped and brutally killed. Mangudadatu was challenging Datu Unsay mayor Andal Ampatuan, Jr., son of the incumbent Maguindanao governor Andal Ampatuan, Sr., in the gubernatorial election on 10 May 2010 elections. The 57 people killed included Mangudadatu’s wife, his two sisters, journalists, lawyers, aides, and motorists who were witnesses or were mistakenly identified as part of the convoy.\nthe administration of President Gloria Macapagal-Arroyo, the Commission transformed itself into a “high profile watchdog.” While many had questioned the process by which she was appointed, the outspoken Chairperson Leila M. de Lima eventually gained the confidence of her critics. Yet while she reaps accolades for her achievements, some of her colleagues in the Commission are facing accusations of incompetence and absenteeism. What remains to be seen is whether a collegial body like the CHRP, with a bureaucracy of more than 680 personnel, can sustain its momentum and become effective in the long-term if its success is dependent on the popularity and initiative of its Chairperson.\n\nA. Significant/Key Issues in 2009\n\nMajor disasters, both man-made and natural, rocked the Philippine archipelago in 2009. The year opened with an eruption of violence in the Southern Philippines following the collapse of peace talks between Government of the Republic of the Philippines (GRP) and Moro Islamic Liberation Front (MILF) in the latter part of 2008. The hostilities, which had continued throughout the year except during a brief declaration of ceasefire, caused the displacement of up to a million people. But violence in Southern Philippines was\n\n\n5 Supra note 4. In 2009, a television station bestowed its first ever “Public Servant of the Year” on Chairperson de Lima “[f]or her courage and independent-mindedness in speaking out even against colleagues in government and for helping keep human rights on the public agenda with timely and forceful words.”\n\n6 The peace talks between the GRP and MILF collapsed after the Supreme Court declared as unconstitutional the Memorandum of Agreement on Ancestral Domain (MOA-AD) which the parties were due to sign on 5 August 2008. As the culmination of negotiations between the GRP and the MILF, the MOA-AD proposed the creation of the Bangsamoro Juridical Entity (BJE), with defined territories. For more details on Supreme Court ruling, see In the Province of North Cotabato v. Government of the Republic of the Philippines Peace Panel on Ancestral Domain, G.R. Nos. 183591, 183752, 183893 & 183951, 14 October 2008.\n\n7 In July, when the GRP declared the Suspension of the Military Operations (SOMO) and the Suspension of Military Action (SOMA).\nnot only confined to areas affected by the secessionist movement. The simmering rivalries between warring local clans resulted in a string of extrajudicial killings and abductions in Agusan del Sur.9 In Davao City, members of the so-called Davao Death Squad (DDS) were believed to have murdered 89 individuals from January to early December 2009.10\n\nMeanwhile, operations against suspected communists also intensified as the military launched the last phase of its counter-insurgency program dubbed Oplan Bantay Laya (OBL).11 The Alliance for the Advancement of People’s Rights (KARAPATAN) claimed that OBL was responsible for at least 1,188 extrajudicial killings and 205 enforced disappearances of suspected communists from 2001 to 2009.12 On 6 February 2010, the military arrested 43 health workers (collectively known as the “Morong 43”) suspected of being communist sympathizers, in the Rizal province. The military allegedly arrested the health workers using defective warrants,13 and subjected them to physical and mental torture.14\n\nA series of natural calamities hit the country in September and October causing the death of at least 858 individuals.15 Around\n\n---\n\n12 Ibid.\n15 On 26 September 2009, tropical storm “Ondoy” [international name: Ketsana] inundated 80% of Metro Manila and killed around 420 individuals. The following week, 2 October 2009, typhoon “Pepeng” [international name: Parma] ravaged Northern\n230,000 homes were either partially or totally destroyed, affecting more than 400,000 families. The World Bank and other agencies, estimated that $942.9 million was required to meet recovery needs, while $3.48 billion was needed for reconstruction.16\n\nAs the election season began toward the end of the year, many sectors criticised the Commission on Elections (COMELEC)17 for denying accreditation to “Ang Ladlad” a group representing the Lesbian, Gay, Bisexual and Transgender (LGBT) community;18 the Disabled Pinoy Party (DPP);19 MIGRANTE, a group representing overseas Filipino workers; Alliance of Concerned Teachers (ACT); and Courage, a union of government employees.20 However, COMELEC readily accredited groups closely associated with President Gloria Macapagal-Arroyo and her relatives.21 Then, in a series of controversial rulings just a few months before the elections, COMELEC ordered the removal of three provincial governors closely associated with opposition presidential candidate Benigno Simeon C. Aquino III.22\n\n\n18 On 11 November 2009, the COMELEC Second Division denied the accreditation to Ang Ladlad LGBT Party-List (Ang Ladlad) on the ground that it is “advocating immoral doctrines.” On 17 December 2009, the COMELEC En Banc dismissed Ang Ladlad’s Motion for Reconsideration.\n\n\n21 Ibid. Some of the questioned partylist groups include: Ang Galing Pinoy (nominees include presidential son and incumbent district representative Mikey Arroyo); Kasangga (nominees include the president’s sister-in-law, Maria Lourdes Arroyo);\nWhile the election period officially started on 10 January 2010, around 90 incidents of election-related violence had already been reported by the end of 2009. Political analysts suggested this was due to the introduction of automated voting systems, given that politicians who feared they “could no longer manipulate poll results are more tempted to eliminate each other.”24\n\nThe ‘Maguindanao Massacre’ was undoubtedly the most serious among the election-related violence reported so far. Considered the “single deadliest single attack on the press,”25 the killing appeared to have been thoroughly planned.26 More troubling however is the apparent complicity of state security forces in the attack.27 Almost a thousand firearms and hundreds of thousands of rounds of ammunition were seized from the custody of the Ampatuan clan, the primary suspects to the mass murder. Many of the seized firearms and ammunitions turned out to be the property of the Armed Forces of the Philippines (AFP) and the Philippine National Police (PNP).28\n\nBuhay (nominees include evangelist Mike Velarde, a known Arroyo supporter); Bagong Henerasyon (nominees include Quezon City Councilor Bernadette Herrera- Dy); Batang Iwas Droga (nominees include Philippine Amusement and Gaming Corporation Chairman Efraim Genuino); and 1-Utak (nominees include Department of Energy Secretary Angelo Reyes. Meanwhile, militant Bagong Alyansang Makabayan (BAYAN) Secretary-General Renato Reyes Jr., questioned the following party list groups which he claimed to have government ties: Agbiag Timpuyo Ilocano (AGBIAG); Ahon Pinoy (AHON); Akbayan OFW-National (APOI); Aangat Ating Kabuhayan Filipinas (ANAK); Babae para sa Kaunlaran (Babae Ka); Bigkis Pinoy Movement (BIGKIS); Byaheng Pinoy Movement (Byaheng Pinoy); Kalahi Sectoral Party (KALAHI); and League of Youth for Peace Advancement (LYPAD). See DateLine Philippines, 9 accredited party-list groups tied with Arroyo-Bayan, 21 January 2010.\n\n22 Pampanga Governor Among Ed Panlilio, Isabela Governor Grace Padaca and Bulacan Governor Jonjon Mendoza.\n\n\n24 Ibid.\n\n\n26 Asian Human Rights Commission, Philippines: How could the ‘Maguindanao massacre’ have been allowed to happen, 27 November 2009, available at [accessed on 10 June 2010]. It has been noted among others, that the graves where the 57 dead bodies had been buried had already been excavated using a government-owned backhoe and that some reporters have already received information that", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": "7) suggest that, “A political economy of transit emerges in the migration corridors, as shopkeepers and food vendors tailor their services and ware to the needs of a transient population. Archipelagos of motels, smugglers’ drop houses and humanitarian shelters link migration corridors, providing respite for weary travellers.” As Andersson (2016b, 1061) notes, “given that smuggling is a market driven by rampant demand, punitive measures only tend to drive business further underground while new risks are transferred downwards from provider to client.” State-led efforts to control the border have played a key role in the development of new migrant-led industries as individuals seek to circumvent the barriers and control mechanisms that operate to limit the mobility of “subaltern” populations.\n\nBorder industries from both the state and migrant perspectives do not operate in isolation from one another, but rather are inextricably linked in the process and production of these industries; the existence of one, feeds the reciprocal growth of the other. The reactive response by states signals an effort to preserve the structures of exclusion and inequality as typified by the strict enforcement of the border. The continuation of physically and structurally violent state-led industries is implicated in the increasing death and precarity associated with the borders of the global North. There is a certain adaptability of migrant-led border industries to the increasing pressures of state-led industries as the discursive production of “crisis” has fostered the expansion and materiality of border industries. The performance of sovereignty and subsequent migrant response has ensured a circular relationship persists in the violent enactment of the border, embedding both structural and physical barriers for irregular migrant communities.\n\nBorder Industries, Death and the Migrant Journey – The Persistence of Violence in a Globalized System\n\nUnderstanding the negative impact and violent implications of the state-led border industry is integral to challenging the ontologized nature, practice and policy of borders. Despite rising death tolls, attacks against migrants and anti-immigrant sentiment,\nnegative migrant experiences have done little to deter migrants crossing (Slack and Whiteford 2011). The transformation of borderlands into militarized zones of exclusion through greater investment and expenditure in securing the border has resulted in deadly consequences for irregular migrants. Deaths associated with the US border from 1994 to 2009, have been estimated at approximately 5,600 as migrants die from drowning, hypothermia, dehydration, or heat stroke. Despite the deterrence efforts, there is little to suggest that there has been any substantial reduction in migration (Castles et al. 2012). Particularly during the summer months, the death toll rises as physical barriers, primarily located along urban areas of the border forces migrants into more remote and rural areas where they contest the rugged terrain in an effort to evade detection as outlined with the perverse logic of ‘Prevention Through Deterrence’ (Spener 2004; De León 2015).\n\nIn the EU, an unintended consequence to the development of the illegality industry, has created further demand on both sides of the migration control equation (Andersson 2016b, 2014). As state-led efforts demonstrate, policies of exclusion promote precarity in the journey and create an increasingly fragmented, non-linear, social process of negotiation and renegotiation for irregular migrants (Collyer 2010; Koser 2010; Mainwaring and Brigden 2016). The consequences of these maneuvers have been similarly dire. Over 20,000 people have died in the Mediterranean in the past two decades, as the EU now has the dubious distinction of representing the deadliest migrant destination in the world (Musarò 2016). As border controls continue to increase and journeys become more precarious, the death toll in the Mediterranean continues to rise with nearly 3,800 dead in 2015, rising from approximately 3,300 in the previous year (IOM 2016). Current estimates in the Mediterranean are on pace to at least match last year’s totals, with the recorded number of deaths surpassing 2,000 on June 20, 2017, World Refugee Day (UNHCR 2017; Dearden 2017). Efforts to secure the border have not been able to address the structural aspects of the migration industry that are spurred by growing inequality and exclusion as the global North only responds with short term solutions to these issues (Andersson 2016b). The temporary, hot spot approach, only serves to put out small fires without addressing structural inequality between states. While EU officials managed to “close off” the viability of migration routes from North Africa to the Canary Island and into much of Spain, it only shifted the routes into the Central Mediterranean (Lutterbeck 2009). At present, there are similar experiences in Greece, as the closing of borders forces more people into the sea. It is the misdirected focus of counter migration efforts that embolden smuggling, force more dangerous clandestine routes, and amount to an unwinnable battle against irregular migration (Andersson 2016b).\n\nIn both the US and EU, the prevailing mentality of ensuring precarious border crossing is a direct effort to shirk the responsibility surrounding the deaths of irregular migrant populations. Through presenting the deaths associated with irregular crossings as an unfortunate reality of “illegal” and dangerous crossings, it distances the responsibility of the state and its implication in the systemic deaths of irregular border crossers. The nefarious effect of this mentality positions the state in such a way where government\nofficials are able to argue the harsh and dangerous environmental conditions were responsible for the deaths of irregular border crossers, not the violent bordering practices that deliberately produced increasingly precarious journeys. Indeed, it provides the “moral alibi” that state sanctioned policy did not kill vulnerable migrants, harsh environmental conditions did (Doty 2011). The environment and physical characteristics of the borderlands become employed as an active participant in the defence and security of the border despite the seemingly apolitical characterization by the state (Nyers 2012). However, migrant deaths are not an unfortunate reality of irregular migration, but rather the direct and intended consequence of state efforts to control the border. Instead of addressing the failings of current border policy efforts and the violent practice of securing the border, state officials are willing to continue to express disbelief at the number of individuals who die, without acknowledging the role of the state and the implication in the deaths of migrant populations.\n\nThe violence associated with the border and enabled through the production of “crisis” reinforces a hegemonic global apartheid regime predicated on the exclusion of the global South. Achieved through, “maintaining global inequalities insofar as it maintains separate social, political, and economic spaces in the world-system” (Spener 2011, 117), “crisis” becomes the vehicle through which exclusion is justified. The current approach to borders as a militarized means of exclusion contributes to the creation of a new post-colonial apartheid regime both materially and economically (De Genova 2013). Immigration control has become a means of ensuring hegemonic, planetary order through controlling the mobility of “subaltern” populations as states of the global North have established and maintain the separation from the South through control over migration and security (Duffield 2006; Hyndman 2009). This contradiction underscores the logic through which states of the global North have approached globalization. Marked with different rules for different actors despite the appearance and rhetorical efforts to espouse equality in access to global markets (Andersson 2016b), the persistence and expansion of classed and racialized exclusion – including the deaths associated with this exclusion (Jones 2016) – becomes evermore apparent as a central organizing logic in the global system. The production of “crisis” and the continuation of structural violence through the embeddedness of a global apartheid regime, produces precarity and violence on migrants involved in clandestine journeys due to the restriction of their mobility.\n\n**Conclusion**\n\nCastles and his colleagues (2012, 145) argue that “migration should be seen not as a threat to state security, but as the result of human insecurity that arises through global inequality.” Approaching migration from a securitized perspective, predicated on a misleading trope of “crisis,” fails to see migration as inherently structural and cannot be fixed through punitive approaches to migration control (Andersson 2016b). Examining border industries reveals the relationship between the state and migrants as policies of exclusion and drive the growth and development of the respective industries. The\npractice of bordering remains highly problematic as it increases the precarity associated with the irregular migrant journeys. The unwavering commitment to the security narrative and the production of “crisis,” coupled with the obfuscation of state’s role in migrant deaths, will continue to lead to further, more substantial investment in border industries capabilities.\n\nThe circular and paradoxical nature of border industries has been highlighted throughout the article, suggesting that efforts to control the border are met with increased innovation and resistance from migrant populations. This contributes to greater state efforts to control borders in a seemingly never-ending process (re)negotiation of the border and efforts to secure the perceived territorial integrity of the state in a globalized era of increased interconnectivity. There is a need to critically rethink borders in a supposedly globalized system. The perverse logic that currently frames the understanding and performance of sovereignty is antiquated and desperately needs to move beyond the inside/outside logic that has served to entrench classed and racialized segregation in the international system. Embedding barriers, both physical and structural, remain intact ensures the violence of borders will persist and the marginalization and deaths of irregular migrant populations will continue.\nReferences\n\n\nColly", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " civil society in the countries in which they work.\n\nAt a 1995 conference on development,1 discussion of the role of external forces in nurturing associations that strengthen civil society was notable...\nfor the lack of one vital question: what kind of civil association strengthens civil society? That is, how do we try to ensure that strengthening resources for civil society nurtures beneficial rather than destructive and divisive groups? This strikes at the core of the split between the positions of de Tocqueville and Bayart, which has also been central to some of the best academic work done recently on the politics of Africa. NGOs have a responsibility to assess whether all civil associations act as building blocks for civil society, or only those with specific, identifiable characteristics. Sadly, this issue has been too easily overlooked by NGOs eager to embrace the perceived benefits of the revived interest in civil society.\n\nNGOs and the grab for civil society\n\nSince 1990, the concept of civil society has been ‘grabbed’ by NGOs as one relating closely to their own natural strengths. On the surface, civil society is intimately connected with the role of local community associations or groups, and with the indigenous NGO sector. For Northern NGOs, this leads to an intellectual association between civil society and local ‘partner’ or implementing organisations. From studies of the factors that encouraged a focus on civil society (e.g. Robinson 1995) two central trends can be discerned in donor and NGO thinking.\n\nAmong donors, interest in civil society has been associated with the evolution of the conditionality of aid. Conditionality, which rose to prominence in the 1980s, allowed donors to think more creatively about the large-scale impacts of their bilateral programmes. From 1990, conditionality took on a political dimension when some donors became preoccupied with ‘good governance’. This tendency acquired an economic as well as moral rationale with the 1991 World Development Report (World Bank 1991), in which democracy was projected as not only ethically desirable but also more efficient. Donors began to re-appraise the role of civil society in providing a foundation for sustainable democracy. The work of political scientists such as Stepan (1998), Stocpol (1992), and Keane (1998) variously pointed to civil society as the key to making good governance work.\n\nThus, the democratising function of civil society assumed a higher profile among multilateral agencies, and NGOs were identified as a possible point of contact with its building blocks, namely civil associations. Coupled with these changes was an increasing awareness among NGOs of their own potential role in the wider development picture.\nContemporary with the rise of Participatory Rural Assessment (PRA) and its methodologies — a new orthodoxy for promoting community-based design of, and control over, development projects — was a converse trend. This was the idea that NGO-supported projects can legitimately have wider and much larger economic, social, and political objectives. As NGOs acquired new ways of thinking about ‘partnership’ and the implementation of projects by local organisations, so they were also considering the wider ramifications of such activities. A 1992 conference on ‘scaling up’ the impact of NGOs marked a breakthrough in addressing the potential macro-impact and macro-application of grassroots development activities (Edwards and Hulme 1992).\n\nThe process was spurred on by the UN, which moved to the fore in promoting civil society as a development issue. UNDP, UNICEF, and ECOSOC introduced procedures to provide voluntary associations with greater access to their systems; and ECOSOC’s review of NGOs has discussed the possibility of funding Southern NGO participation at ordinary UN business meetings (UN NGLS 1995a: 7). However, assumptions about the nature of NGOs have allowed the issue of ‘access’ by the voluntary sector to dominate discussions about civil society within the UN. Indeed, the UN NGO Liaison Service has produced an impressive paper emphasising the expanding place for NGOs around UN tables (UN NGLS 1995b).\n\nThe combination of donor, NGO, and UN interest provides the background to the civil society ‘grab’. But few NGOs have explored the full theoretical implications of civil society, or clearly articulated their own interpretations of its nuances. The problem is the belief that NGOs are inherently bound to strengthen civil society, an assumption which, if acted upon, might in fact weaken the evolution of civil society in certain contexts.\n\n**The theoretical division**\n\nCivil society is usually held to be the collective intermediary between the individual and the state. For de Tocqueville, civil society (in contrast to traditional society) is a defensive counterbalance to the increased capabilities of the modern state. It provides a realm in which society interacts constructively with the state, not to subvert and destroy it, but to refine its actions and improve its efficiency. Thus, civil society tends to be associated not with the selfish drive of Hegelian theory, but with the constructive actions of altruistic concern.\nHence, civil society groups coalesce not on the basis of primordial attachments (ethnicity, language, religion), but rather on ‘small issues’ that cut across such boundaries and bring people together in new coalitions. For de Tocqueville, a key example was the nineteenth-century temperance movement in the USA, which brought together thousands of disparate people under a common banner. The anti-slavery movement or anti-Corn Law League played similar roles in Britain.\n\nThe implications for development practitioners relate to these ‘small issue’ coalitions or ‘civil associations’. Stepan’s study of Brazil (Stepan 1988) gives grounds for ruling politically motivated groups out of the equation, and for focusing on those local NGOs, human rights groups, and leisure associations which conform with de Tocqueville’s precepts.\n\nSmall issues\n\nThe reasons why an association forms are critical for its long-term role. Associations which bring people together, regardless of old identities, to work together for development — to form credit schemes or health clubs, for example — may play empowering roles. In the short term, so will those associations which undertake the same functions in primordially homogeneous groups. But in the latter case, their aim may move from the ‘small issue’ (sadly, in this context community development is a ‘small issue’) to strengthening the primordial group’s comparative position within a wider context of clientelism and patronage.\n\nThus, classical de Tocquevillian thinking offers a crucial challenge to NGOs working to strengthen local civil associations or community groups. Most NGOs, however, lose sight of these crucial caveats about the quality of associative forms. They adopt the view that all civil associations — that is, all community or development groups — naturally build civil society. Take, for example, the definition of civil society underpinning UNDP’s policy on the links between its own programmes and civil society (UNDP 1993). This has become something of a mainstay within the NGO sector, and it rests on the intermediary role of civil society and the state, viewing social movements as civil society groups. Thus, all associations, no matter how primordially-rooted or patronage-based, are seen as civil society organisations (CSOs).\n\nUNDP’s position has been seminal for many development groups, and the focus on interacting with civil society rather than analysing its composite parts has had major impact. The concentration on NGOs’ access to the UN system, mentioned above, has muted discussion of the\nlong-term impact of different types of NGOs. UNDP’s 1995 paper, prepared for the UN’s fiftieth anniversary, picked up its earlier work on civil society (UNDP 1995). Its focus is primarily on collaborative mechanisms, and its definitions refer to civil society collectively, rather than to individual elements within it.\n\nThe adoption of such a limited definition may be crucial. For example, a village-level project in a highly heterogeneous area may unwittingly undermine the future growth of civil society. If the village is primordially homogeneous, and the project develops strong local organisations without setting up umbrella bodies to promote co-operation with other villages, what has it achieved? In some instances, it will have increased the village’s capacity to play the patron/client game, and strengthened its internal identities, without forging the mechanisms to build civil society.4\n\nNGOs and Bayart\n\nSome argue that all associations and community groups are indeed components of civil society, a view associated with Jean-François Bayart, whose work explores societies’ attempts to subvert and control the state (Bayart 1986; 1993). In this view, projects that simply strengthen groups associating on primordial grounds are facilitating a natural, competitive process arising from the specific characteristics of African civil society. This suggests that it is largely inappropriate to apply Western concepts of civil society to contexts in which primordial attachments are unlikely to decline in the near future.\n\nBoth arguments have their strengths and weaknesses. However, evidence is emerging to suggest that primordial attachments do change with the process of societal change, and this may have important implications. There is a school of thought centred on ‘bringing the state back in’, and exemplified by Laitin’s work on Nigeria, that suggests the state can hugely affect primordial identities through its own changing policies (Laitin 1992). The example of Pakistan suggests that the development of a local bourgeoisie may foster integrative groups based on ‘small issues’, even in the face of entrenched ethnic or religious divisions (Whaites 1995). World Vision UK, in perhaps the first NGO research into the relationship between identities and nascent civil society, found that even apparently destructive political acts, such as displacement and conflict, may provoke conditions conducive to the growth of civil society (Westwood 1996).\nSuch examples suggest that we should not yet give up on traditional, evolutionary ideas of civil society. The interaction of social change", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " period of the ‘economic miracle’, when yearly growth was well into two digits. After the death of the journalist Vladimir Herzog in prison in 1975, which got quite some repercussion and protests at home and abroad, protests became louder and the press bolder. The death of the metallurgical worker, trade union member, Manoel Fiel Filho in 1976 in a Department of Information Operations led to the dismissal of the general responsible for that unit (Fico 2004: 29-56). From 1977, repression, torture, and disappearances decreased, although censorship was strict until the end of the seventies. In 1979, by the end of Geisel’s mandate, the president and his successor, the last military president, Figueiredo, were preparing for the return to democracy through the abertura (Castro 1995). The state of exception, established\nin 1964, ended in 1979, and was followed by the phase of transition to democracy. Exiled politicians were asked to return to Brazil, which a number started doing. Artists and academics, gone into exile to escape persecution, were also slowly coming back. Censorship had made life very difficult for artists, although with creativity, quite some interesting works have been produced in very different areas, such as film, music, theatre (Reis et al. 2014: 11-47, 172-185, 203-215).\n\nAlthough the number of victims who died of torture or disappeared was much lower than in neighbouring countries such as Argentina and Chile, Brazil addressed the topic of investigating the past much later than these countries. Only when Dilma became president, herself a victim of the military having been tortured by them, did she establish a Comissão Nacional da Verdade, in 2012. This National Truth Committee has an ample mandate, interviewing victims and authors of torture, opening archives about this period, and trying to find out if archives had disappeared, etc. The final report was ready in 2014 (Comissão Nacional da Verdade 2014). According to a number of Brazilians, the transition to democracy got a great boost with the advent of this Committee, and thanks to her work, democracy can be considered consolidated (Oliveira 2013). Other Brazilians, national and international academics and politicians, regard the 1992 Collor de Mello impeachment procedure already as evidence of Brazil’s maturity as a democracy.\n\nIn that same year, 1992, there were many protests, inspired by those under the military regime. There was also a direct link between the protest movements of 2013 and 2014 and those during the military regime. Because of the lasting impact of the military regime in Brazil, a workshop was organised in Leiden University, precisely 50 years after the coup, on the 31st of March 2014, looking at how Brazil was shaped during the military regime and how it has emerged from it, following the return of democracy. The participants in the workshop also looked at the legacies of the regime in a democratic Brazil, and, in how far, this period still has an impact on the Brazil of today, and, at the same time, what kind of changes took place since the consolidation of democracy, in quite a number of areas such as national and international politics, social and cultural movements, and also at the role of the military then and now. Some results of this workshop are found in this dossier.¹\n\nAs Timothy Power points out, the military regime had a relative legitimacy when compared to other dictatorships in the Southern Cone. Power examines several variables which impact on the way politics has played out between 1985 and 2014: a high level of continuity of personnel inherited from the military period, an accentuated commitment to civil liberties, as in the Constitution of 1988, a more robust level of\n\n¹ For the organisation of the workshop, thanks must be given to the Leiden Chair of Brazilian Studies Rui Barbosa, and to the Leiden History Institute. Due to constraints of space, not all contributions could be included here. João Roberto Martins Filho showed the complexity of the military regime in Brazil. Esther Limonad focused primarily on mass mobilization, in particular on the grassroots movements from 2013, and made an analysis of the changes of the Brazilian state, of what has not changed and the (re)actions against it. Tânia Pelligrini painted a more general picture of the specific actions of the military regime leading to the effective consolidation of the Brazilian cultural industry.\npolitical competition compared to the pre-coup years, and a delayed but increasingly meaningful consideration of transitional justice issues. He also stresses the importance during the mass mobilization (the street), which engendered the collapse of the military regime, and has been used a number of times since.\n\nMarianne Wiesebron analyses Brazil’s foreign policies, during the military regime, in the middle of the Cold War, well into the 21st century. One important concept is Independent Foreign Policy, presented in 1961, but only really developed under President Geisel when the Brazilian government started its cooperation with the People’s Republic of China, amongst others, in the framework of Brazil’s national economic development. The Brazilian military followed an independent path in an adverse conjuncture, becoming less aligned to Washington, as no reciprocity came from the US in return for Brazil’s loyalty. The pendulum movement of governments more or less aligned to the US does also happen in times of democratic regimes. President Cardoso was much more aligned to Washington, especially during his first mandate, while President Lula really put Brazil on the world map.\n\nRoberto Vecchi focused on the problem of trying to give back a memory of those who disappeared during the military regime. The worst case is that of the Araguaia guerrilla, which disappeared without leaving any traces. Although limited in numbers, state violence started earlier than in other neighbouring countries. His analysis, based on the novel K. by Bernardo Kucinski, from 2011, shows how to weave a public memory from the disappeared and, more generally, from the repressive traumas of the authoritarian years.\n\nMaria Lucia de Barros Camargo presents a much more specific analysis, concentrating on the Revista Civilização Brasileira, published between 1965 and 1968, which can be considered the first magazine to be launched with the explicit objective of resistance to the 1964 military coup. Furthermore, the theme song of Chico Buarque, Tem Mais Samba, introduced in 1964, is the start of a reflection on the discussions about the state of culture, especially with regard to literature and its relationship to popular music. She studies the survival in and of the Brazilian popular music (MPB), 50 years after the coup.\n\nFinally, Vinicius de Carvalho, aims his attention at a musical show Opinião, whose premiere was on the 11th of December 1964, at the Teatro Arena in Rio de Janeiro, under the direction of Augusto Boal. The show was considered a manifesto, a clear protest against the socio-economic conditions in Brazil. It became a reference to what became known as protest music against the regime established in March of that same year in Brazil. This show substantiated the various social and political demands of Brazil at that time and became an aesthetic and political paradigm. At the same time, the 1964 production is compared to the reinterpretation of the show in 2014. The goal is to seek to understand how, 50 years after the coup and the show Opinião, Brazilian music and art reflect not only that historical moment, but also its role in the contemporary socio-political context.\n\nThe articles of this dossier show clearly how in some ways there is an enduring impact of the military regime, while at the same time democracy became consolidated.\nThey also highlight the political, social, cultural complexities of the various periods, and, above all, how many protests there have been, in many different forms, which also, in some ways, persist over 50 years later.\n\nREFERENCES\n\n\n---\n\n| Marianne L. Wiesebron | is Associate Professor of History at the Department of Latin American Studies at Leiden University. She specialises in Brazilian foreign relations and society. She also works on current economic and political developments in Latin America, in particular on problems of regional integration in South America. Amongst her recent works: “Social Policies during the Lula Administration: The Conditional Cash Transfer Program Bolsa Família” (2014), *Brazil under the Worker's Party: Continuity and Change from Lula to Dilma* (Co-Ed. 2014); “Democracia participativa e cidadania no Brasil” (2013).<|endoftext|>THE GOOD AND THE BAD OF GLOBALIZATION\n\nAlthough globalization is a nebulous term for many Americans, it is the subject of a contentious worldwide debate. At the center of that debate are questions involving economic domination of world markets and distribution of wealth, as well as the homogenization of cultures.\n\nGlobalization is an ongoing process resulting in increased economic, political and cultural changes fostered through rapid worldwide communication and transportation. The last two decades of the 20th century witnessed the proliferation of satellite phones and Internet communication, as well as worldwide air, water and land transportation, transforming the diverse world into an interconnected place.\n\nWhile increased speeds of communication and transportation seem at first blush to be beneficial to everyone—particularly when combined with free trade and commerce—there are underlying concerns. These concerns deal with the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " percent. Moreover, the total volume of cases filed with USCIS actually fell from 8,530,722 in FY 2017 to 7,650,127 in FY 2019—a drop of more than 10 percent. Given that the agency is fee-funded, this disparate level of growth in personnel appears unjustified and unsustainable.\n\nPerhaps most importantly, the growth in personnel does not appear to have resolved longstanding problems within the agency. Average case processing times—the time it takes the agency to adjudicate the various forms of petitions and applications that it receives, including applications for naturalization and permanent residency—surged by 46 percent between 2017 and 2019. The agency has therefore significantly increased its day-to-day costs at a time when its revenue from filing fees has decreased, while also taking significantly longer to meet its processing goals.\n\nThe agency is now asking American taxpayers for a bailout, while millions of people and employers continue paying considerable filing fees for a decreasing level of service, without any clear plan for improvement. News reports indicate that the agency is proposing to add a 10 percent surcharge on almost all applications and petitions to pay back the bailout, while at the same time racing towards finalizing a fee rule that would increases filing fees significantly, which could deter individuals from filing immigration benefit requests. As a condition for receiving congressional appropriations, Congress must impose common-sense reforms, as well as ensure that USCIS is transparent and responsible regarding its fiscal management.\n\nTo that end, Congress should appoint an independent auditor to conduct an immediate review of the agency’s funding request by June 15, as well as a full audit of its budget and operations by June 30. Congress should direct USCIS to provide the following data which are also set forth in the bipartisan Case Backlog and Transparency Act of 2020 (H.R. 5971):\n\n- Data showing case receipts for fiscal years 2018, 2019, 2020, broken down by form type.\n- Data, by form type, showing the number of pending benefit applications, the net backlog, and the gross backlog at the end of each quarter for fiscal years 2018, 2019, 2020.\n- Data showing the average processing time and processing time goals for each benefit application at the end of each quarter for fiscal years 2018, 2019, 2020.\n\n---\n\n\nAll USCIS Application and Petition Form Types (Fiscal Year 2019, 4th Quarter, Jul. 1 – Sep. 30, 2019), [https://www.uscis.gov/sites/default/files/USCIS/Resources/Reports%20and%20Studies/Immigration%20Forms%20Data/All%20Form%20Types/Quarterly_All_Forms_FY19Q4.pdf](https://www.uscis.gov/sites/default/files/USCIS/Resources/Reports%20and%20Studies/Immigration%20Forms%20Data/All%20Form%20Types/Quarterly_All_Forms_FY19Q4.pdf).\n\n• Data showing any transfers of funds between fee accounts and between Department components.\n\n• Approval and denial rates for processed cases, disaggregated by immigration benefit type for each quarter for fiscal years 2018, 2019, 2020.\n\n**In addition, Congress should ask USCIS to provide the following information:**\n\n• What is the precise methodology that was used as the basis for the agency’s projected shortfall of $1.2 billion due to the COVID-19 pandemic?\n\n• If the agency’s shortfall is in fact due to the COVID-19 pandemic, why did USCIS issue a similar projected shortfall in November 2019 when it published its most recent proposed fee rule?\n\n• If the agency was already anticipating a budget shortfall in 2019, why did it propose to transfer more than $100 million of its funding to U.S. Immigration and Customs Enforcement in its November 2019 proposed fee rule?\n\n• Can the agency provide a detailed accounting of the funds and resources that it has reallocated to other agencies?\n\n• Given the increases in overall processing times and the agency’s budgetary concerns, how has USCIS been able afford the diversion of hundreds of its staff to conduct enforcement work for ICE and CBP in the last year?\n\n• Has the agency provided a detailed analysis of the factors that have contributed to its delays in case processing?\n\n• How much money is the agency holding in its premium processing fee account and how are these funds currently obligated?\n\n• Has the agency provided detailed data on filings by week and visa category to substantiate its claim of an overall decrease of 70 percent in filings?\n\n• Has the agency provided detailed expenditure data for at least the last three years?\n\n• Has the agency provided information on per-officer productivity and metrics?\n\n• Has the agency provided detailed information on the recent growth of its Fraud Detection and National Security Directorate?\nUSCIS should adopt cost-efficient measures for adjudicating immigration applications and petitions\n\nIn recent years, USCIS has adopted a series of policies and practices that have created inefficiencies in its operations – increasing the agency’s overall cost of adjudicating immigration applications and petitions – while at the same time resulting in a reduction in the overall number of applications and petitions that the agency receives. Congress should not appropriate temporary funding until USCIS takes the following measures to reduce the cost of adjudicating immigration applications and petitions:\n\n• **USCIS should eliminate its in-person interview requirement for routine cases.** In October 2017, USCIS began implementing its in-person interview requirement for all individuals seeking lawful permanent residency through their U.S. employer as well as certain relatives seeking family reunification with asylees and refugees. Under prior policy, USCIS officers had discretion to require such interviews on a case-by-case basis, where, for example, applications presented fraud or national security concerns. The new policy mandates those interviews indiscriminately, despite no meaningful evidence of this requirement’s utility. Unneeded, time-intensive interviews drain agency resources. USCIS should eliminate its in-person interview requirement for routine cases that present no fraud or national security concerns.\n\n• **USCIS should reinstitute the agency’s 2004 “deference” policy.** In October 2017, USCIS rescinded longstanding guidance under which USCIS adjudicators deferred to prior approvals of temporary immigration benefits when processing requests to extend those benefits absent error or a material change in circumstances. Under the agency’s new guidance, USCIS personnel must now effectively re-adjudicate many previously approved petitions despite no change in the terms and conditions. This needless duplication of efforts squanders resources, drives delays, and creates inconsistency in adjudications. To more cost-effectively adjudicate petitions, USCIS should rescind its 2017 policy and reinstitute its 2004 deference policy.\n\n• **USCIS should reuse biometrics and waive the biometrics requirement for certain groups.** USCIS should exercise its discretion pursuant to 8 CFR 103.2(b)(9) to limit when biometrics need to be captured. In order to save personnel and processing costs, USCIS should reuse all biometrics that have been captured within the past five years for any form type and waive the biometrics requirement for individuals under the age of 14 or above the age of 65, as well as for applicants who have been previously vetted, such as Form I-539 and naturalization applicants.\n\n---\n\n\n• **USCIS should stop rejecting applications and petitions due to alleged incompleteness or blank spaces.** USCIS has recently begun implementing a policy in which the agency is rejecting, and in some cases denying, applications and petitions for alleged incompleteness for failure to complete certain sections of the form. This includes rejecting forms for failure to write “N/A” in boxes that are clearly inapplicable; for example, failing to write “N/A” in the “apartment number” box for an applicant who lives in a house. In some cases, USCIS has even rejected applications where an applicant or petitioner indicates “not applicable”, “na” or “none” instead of “N/A” in a particular section of the form. Requiring officers to review for non-material spaces and expend resources to return petitions and fees is an inefficient use of agency resources and creates an unnecessary barrier to accepting applications and petitions, especially for unrepresented applicants. USCIS should refrain from rejecting applications and petitions on this basis.\n\n• **Issue RFEs and NOIDS more judiciously.** In recent years, USCIS has been issuing Requests for Evidence (RFEs) and Notices of Intent to Deny (NOIDs) at an unprecedented high rate, which wastes limited staff resources and increases the overall time it takes from USCIS to adjudicate applications and petitions. For example, for H-1B petitions, USCIS data reveals the percentage of completed cases with RFEs increased from 22.3 percent in FY2015 to 40.2 percent in FY2019. The RFE rate reached 60 percent during the first quarter of FY2019, and was 47.2 percent during the first quarter of FY2020. Frequently, RFEs and NOIDs are issued seeking evidence that has already been provided or that is unnecessary to establish eligibility. The agency should take steps to issue RFEs and NOIDs more judiciously to spare agency resources.\n\n• **DHS should immediately suspend its public charge rule.** DHS recently implemented a convoluted and inefficient new framework that radically heightens the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " We ask you to spread the word and Activate others. Including the community will give us more pressure to resolve the many attacks that we have felt in recent years.\n\nWhile addressing the members of ED 51, I said I would add one more word to the three directives of the RA and that word is VOTE. That is how our power can and will be felt. NYSUT is introducing a new campaign “Pledge to Vote”. Research has proven that IF A PERSON MAKES A FORMAL COMMITMENT TO DO SOMETHING, THEY ARE FAR MORE LIKELY TO FOLLOW THROUGH ON THAT COMMITMENT. I hope you will take action right away. Encourage your children and grandchildren who are not yet registered to vote to do so, then “Pledge to Vote”, as well.\n\nNYSUT has set a goal of signing up 95% of its members in this “Pledge to Vote” Campaign. Volunteers will ask members to sign pledge post cards or to sign the pledge at pledge.nysut.org.\n\nCan you be an educated, motivated and activated retiree and sign on to the “Pledge to Vote” Campaign even before you are asked? RC 7’s delegates and Executive Board have signed on - NOW IT’S YOUR TURN!\n\n**In Remembrance**\n\n
\n\n
\n
Jamesville-Dewitt
\n
Marcellus
\n
\n\n\n
\n
Angela Marziale
\n
Carmen Costa
\n
\n
\n
Henrietta Merel
\n
Helen Ordon
\n
\n
\n
Robert Reals, Sr.
\n
Audrey Riggall
\n
\n
\n
Liverpool
\n
\n
\n
\n
Gloria Bassi
\n
\n
\n
\n
Michael Gorman
\n
\n
\n
\n
Beverly Grome
\n
\n
\n
\n
Fayetteville-Manlius
\n
OCM BOCES
\n
\n
\n
Robert Avery
\n
John Fiori + Syr
\n
\n
\n
Betty Osborn
\n
Dorothy Truex + Aub, Marcellus
\n
\n
\n
Alice Pearlman
\n
\n
\n
\n
Priscilla Steinbach
\n
\n
\n
\n
Baldwinsville
\n
Syracuse
\n
\n
\n
Mary Allen
\n
Arthur Belge + ESM
\n
\n
\n
Kenneth Cook
\n
Gloria Butler
\n
\n
\n
East Syracuse-Minoa
\n
Sandra Carroll
\n
\n
\n
Charlene Connolly
\n
Gary Crofoot
\n
\n
\n
\n
Peter D’Agostino
\n
\n
\n
\n
Audrey Damon
\n
\n
\n
\n
Paul Dievendor
\n
\n
\n
\n
Vida Fellows
\n
\n
\n
\n
Joan Gilels
\n
\n
\n
\n
Betty Koziol
\n
\n
\n
\n
Maureen Mirabito
\n
\n
\n
\n
Caroline Richardson
\n
\n
\n
\n
Catherine Steiger
\n
\n\n
\n\n**North Syracuse**\n\nRobert DeDell, Sr.\nJames Lamic\nEdith Spann\n\n**Fabius-Pompey**\n\nJoyce Berg\n\n**Onondaga CC**\n\nBernard Naselli\n\n**Westhill**\n\nTheresa Blair\nRichard Pietrowicz\n\n**Port Byron**\n\nJean Farrell\n\n**Auburn**\n\nMildred Cefaratti\nAlfred Farrell\n\n**West Genesee**\n\nJohn Calvert\nJoin Us on June 21, 2016 for the RC 7 Luncheon at NYSUT, 4983 Brittonfield Parkway, E. Syracuse\n$15 per person\nRegistration @ 11:30 • Meeting @ Noon • Lunch @ 12:30 • Scholarship Presentations after Lunch\nSpend time with friends and colleagues and congratulate the scholarship winners!!\n\nLuncheon Buffet catered by John’s and Sons includes Chicken Cordon Blue, Garlic Mashed Potatoes, Vegetables, Romanian Strawberry Salad, Rolls and Butter, Cookies, Soda and Water\n\nDirections: From Rte. 481, take exit 7. Turn right, then left onto Brittonfield Parkway. NYSUT is on the right.\n\nReservation Form\n\nName ___________________________ Phone ___________________________\n\nEmail __________________________\n\nNumber of reservations ________ at $15. Amount enclosed $ _________\n\nPlease send reservation form and a check payable to NYSUT RETIREE COUNCIL 7 to:\nFRAN HUDSON, NYSUT Regional Office, 4983 Brittonfield Parkway, Box 247, E. Syracuse, NY 13057\nReservations must be received by June 1st. No one can be seated without a reservation.\n\nRC 7 TRIPS\n\nRC 7 Trip: Tioga Train “Oktoberfest Express” October 21, 2016\n\n- Round trip motor coach transportation to Wellsboro PA\n- One lunch aboard Tioga Railroad\n- Tour of Leonard Harrison State Park and “Grand Canyon of the East”\n- Admission to:\n - Tioga Railroad Scenic Tour\n - Harrison State Park\n - Highland Chocolate Factory Store\n\nTioga Train Trip Info: Cost is $140 per person.\nInitial deposit of $40 per person and registration form is necessary to reserve your seat.\nBalance will be due by September 15, 2016.\n\nBella Tours ~ 315-652-0121 ~ bellatours@hotmail.com\nQuestions? Contact Marge Schuster at 446-2037 or mschuster730@yahoo.com or go to RC7’s website.\n\nNYSUT RETIREE COUNCIL 7 & 8 Tioga Train “Oktoberfest Express” RESERVATION FORM\n\nPlease complete the following form for each traveler and return to Bella Tours and Travel Inc. 305 Vine Street, Suite 9, Liverpool, NY 13088\nPhone# 315-652-0121 Fax# 315-299-4733 email: bellatours@hotmail.com\n\nName ____________________________________________ M______F______\n\nAddress __________________________________________\n\nHome Phone # ___________________________ Cell Phone# ___________________________\n\nOptional Cancellation Insurance? Yes___ No____ (please submit with deposit - insurance is $10 per person - additional info available at Bella Tours)\n\nMethod of payment: Cash_____ Check#_____ Credit Card ____ (call cc info into Bella) Money Order _____\n\nPlease indicate any physical limitations, and dietary restrictions.\nBring a list of medications and allergies with you on tour.\n\nMake checks payable to Bella Tours and Travel Inc. (There will be a $20 fee for any returned checks.)\nSave with NYSUT Member Benefits\n\nThe NYSUT membership is made up of a variety of diverse professionals within the education and health care industries -- joining together in support of those who depend on them. We salute these men and women for their dedication and the sacrifices they make on a daily basis to help improve the lives of others.\n\nAnd we are proud to offer you -- the hard-working NYSUT member -- an opportunity to participate in the more than 40 endorsed programs & services offered by NYSUT Member Benefits.\n\nLook to Member Benefits for crucial insurance programs such as auto, homeowners, life, disability, or long-term care insurance. Member Benefits also offers a variety of travel, entertainment & shopping options to help you with everything from daily purchases to those special once-in-a-lifetime excursions.\n\nThe following is just a sampling of the endorsed programs & services available to NYSUT members & their families:\n\n- Homeowners Insurance\n- Auto Insurance\n- Legal Service Plan\n- Financial Counseling Program\n- Life Insurance\n- Vision Plan\n- ID Watchdog\n- PayCheck Direct\n- Car & Truck Rentals\n- Wyndham Hotels\n- Endless Vacation Rentals\n- Buyer’s Edge, Inc.\n\nTo learn more about Member Benefits-endorsed programs & services, visit memberbenefits.nysut.org or call 800-626-8101.\n\nFor information about contractual endorsement arrangements with providers of endorsed programs, please contact NYSUT Member Benefits. Agency fee payers to NYSUT are eligible to participate in NYSUT Member Benefits-endorsed programs.\n\nMay/June ’16<|endoftext|>NCPR Diversity Statement 2018\n\nWe believe that diversity is essential in all areas of our operation: staffing, broadcast and digital content, and advisory board participation.\n\n1. **Staffing.** NCPR is recognized by the federal government as a woman-managed broadcast entity. However, NCPR is always striving to diversify the racial makeup of the staff. This is a challenge because the station is located in a region that has only a one percent measurable permanent population that is non-white. The station does", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-politics", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-politics/part-00-00000.npy", "text": " of proletarians necessary to this system. Today, however, such methods are no longer necessary. The economic power of the system has become sufficient to accomplish the desired result without breaking the law of private property. In fact, it is by the operation of this law that every year a sufficient number of farmers and independent craftsmen are given the choice between starvation and work in the factories.\n\nThat the number of the proletariat is steadily on the increase is such a palpable fact that no one attempts to deny it, not even those who would make us believe that society today rests on the same basis as it did a hundred years ago, and who try to paint the picture of the small producer in rosy colors. Indeed a change has taken place in the make-up of society, just as it has in the system of production. The capitalist form of production has overthrown all others, and become the dominant one in the field of industry; similarly wage-labor is today the dominant form\nof labor. A hundred years ago the farming peasantry took the first place; later, the small city industrialists; today it is the wage-earner.\n\nIn all civilized countries the proletarians are today the largest class; it is their condition and modes of thought that tend to control those of all the other divisions of labor. This implies a complete revolution in the condition and thought of the bulk of the population. The conditions of the proletariat differ radically from those of all former categories of labor. The small farmer, the artisan, the small producers generally, were the owners of the product of their labor by reason of their ownership of the means of production. The product of the labor of the proletarian does not belong to him, it belongs to the capitalist, to the owner of the requisite instruments of production. True enough, the proletarian is paid by the capitalist, but the value of his wages is far below that of his product.\n\nWhen the capitalist in industry purchases the only commodity which the proletarian can offer for sale, that is, his labor-power, he does so for the sole purpose of utilizing it in a profitable way. The more the working-man produces, the larger the value of his product. If the capitalist were to work his employes only long enough to produce the worth of the wages he pays them, he would clear no profits. But his capital cries for profits and finds in him a willing listener. The longer the time is extended during which the workmen labor in the service of the capitalists, over and above the time needed to cover their wages, the larger is the value of their product, the\nlarger is the surplus over and above the capitalist outlay in wages, and the larger is the per cent of exploitation to which these workmen are subject-ed. This exploitation of labor finds a limit only in the powers of endurance of the working people and in the resistance they may be able to offer to their exploiters.\n\nIn capitalist production, the capitalist and the wage-earner are not fellow-workers, as were the employer and employed in previous industrial epochs. The capitalist soon develops into, and re-mains, essentially a merchant. His activity, in so far as he is at all active, limits itself, like that of the merchant, to the operations of the market. His labors consist in purchasing as cheaply as possible the raw material, labor power and other essentials, and selling the finished products as dearly as possible. Upon the field of produc-tion itself he does nothing except to secure the largest quantity of labor from the workmen for the least possible amount of wages, and thereby to squeeze out of them the largest possible quantity of surplus values. In his relation to his employes he is not a fellow-worker, he is only a driver and exploiter. The longer they work, the better off he is; he is not tired out if the hours of labor are unduly extended; he does not perish if the meth-od of production becomes a murderous one. The capitalist is vastly more reckless of the life and safety of his operatives than the master-workman of former times. Extension of the hours of la-bor, abolition of holidays, introduction of night labor, damp and overheated factories filled with poisonous gases, such are the \"improvements\"\nwhich the capitalist mode of production has introduced for the benefit of the working-class.\n\nThe introduction of machinery increases still further the danger to life and limb for the working-man. The machine system fetters him to a monster that moves perpetually with a gigantic power and with insane speed. Only the closest, never-flagging attention can protect the working-man attached to such a machine from being seized and broken by it. Protective devices cost money; the capitalist does not introduce them unless he is forced to do it. Economy being the much vaunted virtue of the capitalist, he is constrained by it to save room and to squeeze as much machinery as possible into the workshop. What cares he that the limbs of his working-men are thereby endangered? Working-men are cheap, but large, airy workshops are dear.\n\nThere is still another respect in which the capitalist employment of machinery lowers the condition of the working-class. It is this: the tool of the mechanic of former times was cheap and it was subject to few changes that would render it useless. It is otherwise with the machine; in the first place, it costs money, much money; in the second place, if through improvements in the system it becomes useless, or if it is not used to its full capacity, it will bring loss instead of profit to the capitalist. Again, the machine is worn out, not only through use, but through idleness. Furthermore, the introduction of science into production constantly causes new discoveries and inventions to take the place of the old ones. So, because they cannot compete with the improved\nmachinery, now this machine, now that, and whole factories at once, are rendered useless before they have been used to their full extent. Therefore, every machine is in danger of being made useless before it is used up; this is sufficient ground for the capitalist to utilize his machine as quickly as possible from the moment he puts it in operation. In other words, the capitalist application of the system of machinery is a spur that drives the capitalist to extend the hours of labor as much as possible, to carry on production without interruption, to introduce the system of night and day shifts, and, accordingly, to make of the unwholesome night work a permanent system.\n\nAt the time the system of machinery began to develop, some idealists declared the golden age was at hand; the machine was to release the working-man and render him free. In the hands of the capitalist, however, the machine has made the burden of labor unbearable.\n\nBut in the matter of wages, also, the condition of the wage-earner is worse than that of the medieval apprentice. The proletarian, the workman of today, does not eat at the table of the capitalist; he does not live in the same house. However wretched his home may be, however miserable his food, nay, even though he famish, the well-being of the capitalist is not disturbed by the sickening sight. The words wages and starvation used to be mutually exclusive; the free working-man formerly could starve only when he had no work. Whoever worked earned wages, he had enough to eat, starvation was not his lot.\nFor the capitalist system was reserved the unenviable distinction of reconciling these two opposites—wages and starvation—raising starvation-wages into a permanent institution, even into a prop of the present social system.\n\n2. Wages.\n\nWages can never rise so high as to make it impossible for the capitalist to carry on his business and to live from the profits of it; under such circumstances it would be more profitable for the capitalist to give up his business. Consequently, the wages of the working-man can never rise high enough to equal the value of his product. They must always be below that, so as to leave a surplus; it is only the prospect of a surplus that moves the capitalist to purchase labor power. It is therefore evident that under the capitalist system the wages of the workmen can never rise high enough to put an end to the exploitation of labor.\n\nThe surplus which the capitalist class appropriates is larger than is usually imagined. It covers not only the profits of the manufacturer, but many other items that are usually credited to the cost of production and exchange. It covers, for instance, rent, interest on loans, salaries, merchant’s profits, taxes, etc. All these have to be subtracted from the surplus, that is, the excess of the value of the product over the wages of the working-man. It is evident that this surplus must be a considerable one if a concern is to “pay.” It is clear that the wages of the working-man cannot rise high enough to be even approximately\nequal to the value of his profit. The capitalist system means under all circumstances the exploitation of the wage-workers. It is impossible to abolish this exploitation without abolishing the system itself. And the exploitation must be great even where wages are high.\n\nBut wages rarely reach the highest point which even these circumstances would permit; more often they are found to be nearer to the lowest possible point. This point is reached when the wages do not supply the workman with even the barest necessities. When the workman not only starves, but starves rapidly, all work is at an end.\n\nThe wages swing between these two extremes. The less the necessities of the workman, the larger the supply of labor on the market, and the slighter the capacity of the working-man for resistance, the lower wages sink.\n\nIn general, wages must be high enough to keep the working-man in a condition to work, or, to speak more accurately, they must be high enough to secure to the capitalist the measure of labor-power which he needs. In other words, wages must be high enough, not only to keep the working-men in a condition to work, but also in a condition to produce children to replace them", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " the rich more than the poor; for they are all the work of his hands,' Job xxxiv. 19.\n\n6. Christ is a very merciful King. Mercy is the prevailing attribute of his nature, which he delights to make the children of men feel the benign effects of. Therefore he has proclaimed himself to be 'the Lord, the Lord God merciful and gracious.' He does not\nwillingly grieve nor afflict the children of men. He takes no pleasure in the blood of his most implacable and inveterate foes; and bears with a very tender hand upon his afflicted, broken, and discouraged people. For the bruised reed he will not break, nor quench the smoking flax. He heals the broken in heart, and binds up all their wounds. In all the afflictions of his people he is afflicted; and he that touches them, touches the apple of his eye.\n\n7. Christ is a very meek and patient King. Never any in the world could have borne such indignities, or digested such affronts, as he has met with from such of his own subjects, to whom he has shown the most distinguishing kindness. Had he not been thus patient, Judah and Ephraim had soon been unpeopled. 'As for them, they were bent to backsliding: though they called them to the Most High, none at all would exalt him,' Hos. xi. 7. Though he sent many prophets unto them, calling upon them, and saying, 'Return, ye backsliding children,' &c. yet they did not regard them. Who after this could imagine, that this just and jealous King would have entertained one thought of kindness towards them? yet hear what he says, 'How shall I give thee up, Ephraim? how shall I deliver thee, Israel? how shall I make thee as Admah? how shall I set thee as Zeboim? mine heart is turned within me, my repentings are kindled together;' ver. 8.\n\n8. Christ is a very beautiful King. His glory outshines the sun in its full strength. The united constellations of all created beauty fall infinitely short of his; for he is fairer than the children of men, yea, he is altogether lovely.\n\n9. Christ is a most humble and condescending King: for he does not disdain to be acquainted with the meanest among the sons of men; the beggar will be as welcome to him as the prince. The poor and the rich are all one to him; and he takes as much notice of Job on the dunghill, as of David on the throne. Hear what the prophet, in the name of this great King, says, Isa. lxvi. 1, 2. 'Thus saith the Lord, the heaven is my throne, and the earth is my footstool: where is the house that ye build unto me? and where is the place of my rest? for all those things hath mine hand made, and all those things have been, saith the Lord: but to this man will I look, even to him that is poor and of a contrite spirit, and trembleth at my word.'\n\n10. Christ is a very rich and opulent King. The earth is the Lord's, and the fulness thereof. He is the heir of all things. Honour and riches are with him, yea, durable riches and righteousness. So that those who are his honest and faithful subjects shall never want any thing that is good for them. Such are the immense trea-\nsures and infinite riches of this glorious King, that all the ministers on earth, and all the angels in heaven, cannot possibly lay them open. For can they grasp the heavens in their arms, and the sun in the hollow of their hands? can they weigh the mountains in scales, and the hills in a balance? Suppose they could do all this, and a thousand times more, yet could they not give an account of the estate of this my King. So that his subjects shall never want either grace or glory.\n\n11. He is an immortal and everlasting King. 'The heavens and the earth shall perish, but he shall endure; yea, all of them shall wax old like a garment; as a vesture shall they be changed. But he is the same, and his years shall have no end,' Psal. cii. 26, 27. Though the best, the wisest, and the richest kings upon earth will die, and leave their subjects exposed to many inconveniences consequent on their death, yet this King of glory lives for evermore, and will rule over his subjects with justice, mercy, and righteousness, through all the ages of eternity.\n\nIt remains to make some improvement of this subject.\n\n1. The kings of the earth have no ground to grudge the kingdom of Christ its freedom in their dominions; seeing it is a spiritual kingdom, and quite of another nature than the kingdoms of this world; and interferes not with any of the just rights and prerogatives of earthly crowns. Yet how sad is it that this kingdom should be an eye-sore to the kings of the earth, and that they should employ their power to suppress and bear it down?\n\n2. The Pope's supremacy, and the supremacy of the magistrate over all persons, and in all causes, whereby they have been made heads of the church, is daring blasphemy against Christ, a bold usurpation of his crown and dignity, and high rebellion against him, who will not suffer the jewels to be stollen from his crown, to deck the head of any earthly power whatever, without the severest testimony of his resentment.\n\n3. There is a government of the church distinct from and independent upon the civil government, lodged in the hands of church-officers, whereby they have a power, in the name of the Lord Jesus Christ, to meet in judicatories, transact matters there according to the word and laws of this King, to dissolve their meetings in his name, to appoint fasts and thanksgivings, as the state of the church may require, to inflict censures on offenders, bind and loose, and to do every thing necessary for advancing this kingdom in a spiritual way, but no otherwise. And whoever presumes to hinder them in these acts of administration, or arrogate any of them to themselves, are in so far enemies to Christ and his royal prerogatives.\n4. This government of the church is not alterable by any power on earth, whether civil or ecclesiastic; nor have they that are entrusted with it any power to give up the rights and privileges conferred on them by Christ to any person or persons whatsoever. If they do so, they are unfaithful to their trust, and their conduct will be highly resented another day.\n\n5. None have power to appoint any parts of worship in the Church that Christ has not appointed. For he is the sole Lawgiver of the church, and has in his word appointed the platform of the worship which he requires of his subjects. And therefore for any to appoint ceremonies and rights of worship which bear not the stamp of his institution, act in opposition to his laws; and all their rites are useless and unprofitable. Equally culpable are those who presume to make any terms of communion, or of admission to the ordinances of the church, but such as Christ has left behind him. This is high rebellion against the King of Zion.\n\n6. The truth of the kingdom of Christ is a solid ground of suffering, on which people may comfortably lose whatever is dear to them in the world, knowing they are in the way of their duty. And this was the ground of the sufferings of the Lord's people in the persecuting reigns before the Revolution, whose memory ought to be always regarded, for their zealous and firm adherence to the prerogatives of Christ's kingdom.\n\n7. The church shall ride out all the storms that can blow upon her, whether from earth or hell. All plots and contrivances against her shall be defeated in the end; for her King liveth, and will never suffer the gates of hell to prevail against her. The crown shall flourish on his head, when the church's enemies shall be ruined, and their kingdoms laid by for ever.\n\n8. However weak any poor believer be amongst many enemies, yet the broken ship shall surely come to land. The spark of grace shall be preserved amidst an ocean of difficulties and corruptions, within or without. The seed of grace sown in the heart shall be maintained, and spring up in the fruits of holiness. All Christ's honest subjects shall be kept by the power of God through faith unto salvation.\n\n9. Whoever they be that refuse subjection to the ordinances and discipline of Christ's house, do in so far reject Christ from ruling over them. Consider this, ye that neglect a regular attendance upon the ordinances of divine institution, and will not submit to discipline and censure for your scandalous, and offensive behaviour. Ye are the enemies of Zion's King, and your conduct plainly declares, that ye will not have this man to reign over you. Repent of this your rebellion, otherwise ye shall be slain as his enemies.\n10. See, believers, ye that are striving against sin and Satan, and\nwaging war with your lusts and all Christ's enemies, to whom you\nare to have recourse for help in all your difficulties; even to your\nAlmighty King, who is infinitely able to help you in all straits.\nMake use of him daily as your King, applying and trusting to him\nfor life, strength, defence, and victory over all your enemies.\n\n11. Lastly, Ye that are strangers to Christ, captives to Satan,\nand under a miserable thraldom to your own lusts, will ye be per-\nsuaded to come under", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " مِنْ الْقُرْآنِ.\n3. قال: فقد أملكتكِ بِبِأَمَامَكَ مِنْ الْقُرْآنِ.\n4. قال: فقد أملكتكِ بِبِأَمَامَكَ مِنْ الْقُرْآنِ.\n5. قال: فقد كنتُكَهَا بِمَا مَعَكَ مِنْ الْقُرْآنِ.\n\nThe above five narrations are related to the same event and are narrated from the same Sahabi whose name is Hazrat Sahl bin Sa'd. So the fact comes to the fore that although there is a literal difference between them, there is no spiritual difference. For example, زَوَّجْتُكَهَا and نْكَحْتُكَهَا are synonymous, similarly, there is no difference between بما معك and على ما معك, the purpose of both phrases is the same. In the same way, أملكتكِ and ملْكَتْكَهَا are synonymous.\n\nThere is no semantic difference among the above five traditions.\n\nAlthough there is no difference in the subject matter of the narrations due to the meaning of the narration, scholars and researchers have tried their best in this hadith to point out the words exactly stated by the Holy Prophet (saw). Along with the rules of critique of Hadith, the narrators and scholars were also endowed by Allah Almighty with the special capability and ability of recognition of Hadith by which they could know the words that came from the tongue of the Holy Prophet. In this regard, Ibn Daqiq al-Eid says:\n\n(These are the same words about an incident, but even though the source of the hadith is the same, they differ. One of the above words is the statement of the Holy Prophet (PBUH). The\n\n---\n\n29 Bukhari, Muhammad ibn Isma'il, Al-Jami 'al-Sahih, Kitab al-Nikah, Bab al-Tazwij ala al-Quran wa bighair sadaq, Dar al-Shaab, Cairo, 1st ed. 1987, No. 5149\n30 Bukhari, Al-Jami 'al-Sahih, Kitab Al-Nikah, Bab iza kaana Al-Wali huwal Khatib, No. 5133\n32 Ahmad ibn Hanbal, Al-Musnud: 334/5, No. 22832\n33 Bukhari, Al-Jami 'al-Sahih, Kitab Al-Libas, Bab Khatam Al-Hadid, No. 5871\n34 Ibn Hajar Asqalani, Fateh al-Bari: 176/9\ncorrect thing in such narrations is to take the path of priority after reflection. It is narrated from Imam Dar Qutni that the narrator who has narrated the words of زوجتكها is correct, the narrators who narrate these words are more in number and also have a better memory.)\n\nAllama Alaai Describes:\n\nIt is known that the Holy Prophet (PBUH) did not utter all these words at that time, so now the only thing left is that he uttered one of these words and the rest of the interpretations are sense-reportings. My heart is inclined towards the preference of this narration which has the word of التزويج because it is the narration of most of the narrators and the words of this Companion زوجتكها يارسول الله also have its context.)\n\nIn the same way, Hafiz Ibn-e-Hajr writes:\n\n(From the above discussion, it got clear that the number of narrators who have narrated the words of التزويج is more than the number of narrators who have narrated other words. In particular, they have guards like Imam Malik. The narration of Sufyan ibn Uyena is similar to his narration and so is the narration of Zaydah.)\n\n5.3 Third case: The narration of Labied ibn Rabi’ah:\n\nLabid ibn Rabia ibn Amir Amiri was one of the great poets of the pre-Islamic era. When he became a Muslim, he gave up poetry and settled in Kufa. He died at the age of 150 in the Ottoman Caliphate.\n\n35 do\n36 do\n37 Ibn Hajar, Al-Asabah fi Tamyiz al-Sahabah, Dar Al-Jail Beirut, 1st ed. 1412 AH: 675/5\n38 Muslim ibn Hajjaj, Al-Jami’ al-Sahih, Kitab al-Sha’r, Chapter, No. 2256\n39 Bukhari, Muhammad ibn Isma’il, Al-Jami’ al-Sahih, Kitab al-Manaqib, Bab Ayam al-Jahiliyyah, No. 3553\nThe above differences in the words of traditions, in the tradition of \"لا كُل صَدَقُ بَيْتٍ قَالَهُ إلشاعِرُ أ، مَا خَلاَ إلِه\" in the second tradition \"لا كُل صَدَقُ بَيْتٍ قَالَتْهُ إلشُعَرَإءُ أ، مَا خَلاَ إلِه\" in the third tradition \"لا كُل صَدَقُ بَيْتٍ قَالَهُ إلشاعِرُ أ، مَا خَلاَ إلِه\" in the fourth one are the words of all these narrations have been narrated from the same Companion, Hazrat Abu Hurayrah. Now, it is unreasonable to say about all these narrations that the Holy Prophet (peace and blessings of Allah be upon him) uttered all these words and none of his companions heard them except Abu Hurayrah, but the fact is that in these narrations, the narrators have used synonyms while sense-reporting, which has led to differences in the words of the text.\n\nAll the above narrations are of the type of sense-reporting. The narrators of the hadith narrated them using synonyms which caused some differences in the appearance of the words. However, they have preserved the meaning of these narrations to such an extent. That despite the difference of words, there is no difference of meaning or deficiency in any of the traditions.\n\n5.4 Fourth case; The Companions narrate the story of the Holy Prophet in their own words:\n\nThis form of sense-reporting is found in those narrations which are related to physical, verbal, or moral conditions. In these cases, it is not possible for the words of all the Companions to be the same, because how the Companions saw them interpreted them in his own words, so there are differences of words in these traditions. There are hundreds of such examples in the books of hadith, here are a few examples.\n\nExamples of Practical Narrations:\n\n1. عن عائشة رضِي إلله عنها قَالَتْ كَانَ رَسُولِ إللهِ أ، نَكْسِرُ حَرَّ هذِه بِبَرْدِ هذَا بِبَرْدِ هذَا بِبَرْدِ، فَيَقُولُ يَأ ُهذَا وَبَرْدَ هذَا بِحَرَّ هذَا. \n\n2. عن أبي بِكَرَ قَالَ، رَأى رَسُولُ إللهِ أ، يَأ بَيْنَ إلِطِبِ وَإِلْخِرْبِزِ. \n\n3. عن عائشة أ ن إلنبي أ، كان يأ كل إلبطيخ بالرطب.\n\nThese all three narrations are related to the action of the Holy Prophet, they have been narrated by three different Companions and the words of each of these narrations are different.\nfrom the other, the interpretation of each Companion is different from the other, and the addition of words in some. However, the main theme of all of them is the same and that is to eat watermelon mixed with moist dates.\n\n**Examples of Verbal Traditions:**\n\nThe following Hadiths are given as examples in the oral traditions;\n\n1. عن أبي هريرة قال: \"بيتُنا الجاهليَّةُ يَتَعَبَّونَ إِلَى الْحَبَشَةِ.» فَقَالَ كَبْرُاءُ ىَتَعَبَّوْنَ إِلَى الْحَبَشَةِ يَتَعَبَّوْنَ إِلَى الْحَبَشَةِ.»\n\n2. عن عائشة رضي الله عنها قال: \"يا عُمَّارُ، أَيْ هُوَ إِلَى إِلْحَبَشَةِ يَلْعَبُونَ", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " and Catechists are to be licensed. The criteria for these functions are spelled out in the canons (Title III, Canon 4, Sec. 3, 5 & 8). Clergy, or senior wardens of vacant parishes, should request licensing for these three functions with a letter to the bishop. The letter should clearly state that the canonical criteria have been met and the person is adequately trained.\n\nPart B: REQUEST AND CERTIFICATION\n\nI ______________________________ , hereby request that the persons listed in Part C of this form be licensed and appointed by the Bishop, to officiate in the lay ministry indicated, under my supervision, at:\n\n________________________________________________________________________\nChurch Name and Mailing Address\n\nAs required by the Canons of the Episcopal Church, USA, Title III.4, I hereby certify that the person(s) listed below are:\n\n(1) a confirmed adult communicant(s) in good standing;\n(2) regular in participating in the worship of the church and receiving Holy Communion; and\n(3) are active in the support of their mission or parish.\n\nFurthermore, I certify that they have received and will continue to receive appropriate training, continuing education, and oversight.\n\n____________________________________ _________________________________\nClergy/Senior Warden of Vacant Parish (Signature) Date\n### Part C: LICENSING AND APPOINTMENT\n\n(Please Type Or Print)\n\nPlease mark (XX) appropriate column(s) for each applicant.\n\n
\n\n
\n
Applicant’s name
\n
Worship Leader (WL)
\n
Eucharistic Minister At Celebrations of Holy Eucharist (EM)
\n
Eucharistic Visitor Take consecrated Sacrament to shut-ins (EV)
\n
\n\n\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n
\n\n
\n\nI hereby LICENSE AND APPOINT the above-named person(s) to officiate for those duties as marked above for a period of three years from this date.\n\n____________________________________ _____________________ \nBishop of Southern Virginia Date\n\nMail to: Bishop’s Office (Licensing), Diocese of Southern Virginia, 11827 Canon Blvd., Suite 101, Newport News, VA 23606\nAudits\n\nThe Canons require that all congregations must provide the Diocese a copy of their annual audit report or a letter from an independent accountant summarizing the audit report. **This audit report or the accountant’s letter is to be mailed to the Diocese not later than September 1 of each year.**\n\nIn addition to the annual audit requirement, a congregation is required to have their books audited whenever a rector leaves a parish. Recognizing that a number of our congregations are small and therefore, an independent audit would be too expensive, the diocesan Treasurer will accept a letter from the congregation’s Finance Committee, stating that the vestry-appointed Finance Committee has conducted an audit of the books and records and are satisfied with the results. Alternatively, the Diocese may be able to recommend someone to conduct an audit for the congregation. If the congregation employs an accountant to conduct the audit, the vestry should employ the accountant. Specifically, the treasurer or comptroller should not select or employ the accountant.\n\nThe Manual of Business Methods in Church Affairs is published by the national church and is available on-line. It covers Financial Management, Internal Controls, Bookkeeping, Taxes, Clergy Discretionary Funds, Audit Guidelines for congregations, insurance, and other important topics. The annual audit of the parish should be conducted using the guidance and checklists provided in Chapter VI of The Manual of Business Methods in Church Affairs. An audit conducted in accordance with this chapter will fulfill all the requirements of the Diocese.\nStaff Position Descriptions & Guidelines\n\nA position description is a statement of the duties and responsibilities assigned to a single individual or a group of individuals performing essentially identical duties. When used as part of a pay system, it is the basis for determining pay grade or salary range. (An employee's length of service in a position, level or qualifications are also used to determine an actual salary.) The duties assigned a position also are the determinants of the qualifications required for a position and thus of the type of person sought for a position.\n\nIt is in both the employee's and the supervisor's interest to have accurate position descriptions. The employee's because it determines his or her pay. An inaccurate position may result in inadequate or unfair pay. The supervisor's because it describes what may be fairly expected of an employee, and because it provides the basis for setting performance objectives to be used in performance evaluation.\n\nThe first place you should go with questions is your immediate supervisor. It is essential that you and your supervisor agree on the duties and level of responsibility described.\n\nSection A - Title\nA word or two that identifies the position, e.g., Parish Administrator, Secretary to the Rector, Receptionist, Comptroller.\n\nSection B - Basic Purpose of the Position\nA sentence or two that explains the title, locates the position in the organization and tells why it exists but does not describe the duties.\n\nSection C - Specific Duties\nA concise paragraph describing each major duty. A major duty is an assignment that is regularly performed, occupies a significant amount of time (10%) and requires a skill or skills needed for successful performance of the duties of the position. Please include the approximate percentage of time each duty occupies. Duties that occupy less than 10% of the time should be grouped into a single major duty that does occupy 10% of the time. For instance, a position may involve the preparation of several quarterly or monthly reports, each taking a day or a major part thereof. While no one of them is more than 1 or 2%, if they were grouped in a single duty they may well aggregate more than 10%.\n\nStaff Position Descriptions Guidelines\n\nDuties that are not performed regularly (once a year is regularly if it takes 10% of the time and represents a skill needed) should not be included, nor should duties that are not representative of the skills needed for the job.\n\nSection D - Nature and Scope of Decisions and Recommendations\nA brief description of the different decisions and recommendations made by you in doing the job and the impact of those decisions and recommendations on the activities of the parish. Of particular importance is the finality of decisions and the respect given recommendations.\nSection E - Nature and Importance of Personal Contacts\nA brief description of the who and why of the personal contacts you experience in performing the major duties of the position, i.e. giving or getting information, solving problems, setting up meetings.\n\nSection F - Supervision Received\nTo whom do you report? How are instructions and assignments given? How often? How is work reviewed? By whom? How often?\n\nSection G - Supervision Exercised\nWhat positions do you supervise? How are instructions and assignments given? What is the authority to accept or reject the work of supervised employees? What is the authority to approve leave, reward or punish for work performed (or not performed) or change assignments?\n\nSection H - Duration of Unsupervised Performance\nHow long do you normally work on a project or on continuing operations without requiring a review session with your supervisor? This may vary from major duty to major duty. Be specific if this is so. The result may be expressed in hours, days or months.\n\nSection I - Skills Required\nList: manual skills needed (e.g., typing, word-processing); educational and professional requirements (e.g., writing reports and articles for publication, ability to meet and greet visitors); and, things unique to the position. Do not list skills that you have that are not being used and that the major duties do not require, e.g., don't list shorthand skills if dictation is not taken.\nStaff Evaluations\n\nA PROPOSAL FOR REVIEWING WORK AND JOB DESCRIPTION PARISH STAFF\n\nSTAFF PERSON’S NAME & DATE\n\nPOSITION/TITLE\n\nSUPERVISOR/REVIEWER\n\nNOTE: It is intended that this mutual review of ministry be a dialogue. It is based on the assumption that some form of accountability goes with responsibility and the assumption that mutually working out our functions and assignments increases our commitment and satisfaction. We hope it will serve to open up communications between a given staff person and his/her supervisor, be a means to improve both our work product and working conditions, and be a means for a more cohesive, happy and effective staff family.\n\nI. Each with a copy of the latest job description in hand, the staff person responds to the following:\n 1. What’s going well for you?\n 2. What parts of your job give you the most satisfaction?\n 3. What special accomplishment do you feel you have made over the past year?\n 4. Which of your expectations do you feel have been unrealistic?\n 5. What factors do you feel have been barriers to your effectiveness?\n 6. What parts/aspects of your work are disappointing? . . . confusing? . . . demeaning", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " to missionary activity by fostering the commitment of the particular churches - especially those of recent origin - to send forth and receive missionaries; and to assure non-Christians and particularly the authorities of countries to which missionary activity is being directed that all of this has but one purpose: to serve man by revealing to him the love of God made manifest in Jesus Christ.\n\n3. **Peoples everywhere, open the doors to Christ!** His Gospel in no way detracts from man's freedom, from the respect that is owed to every culture and to whatever is good in each religion. By accepting Christ, you open yourselves to the definitive Word of God, to the One in whom God has made himself fully known and has shown us the path to himself.\n\nThe number of those who do not know Christ and do not belong to the Church is constantly on the increase. Indeed, since the end of the Council it has almost doubled. When we consider this immense portion of humanity which is loved by the Father and for whom he sent his Son, the urgency of the Church's mission is obvious.\n\nOn the other hand, our own times offer the Church new opportunities in this field: we have witnessed the collapse of oppressive ideologies and political systems; the opening of frontiers and the formation of a more united world due to an increase in communications; the affirmation among peoples of the gospel values which Jesus made incarnate in his own life (peace, justice, brotherhood, concern for the needy); and a kind of soulless economic and technical development which only stimulates the search for the truth about God, about man and about the meaning of life itself.\n\nGod is opening before the Church the horizons of a humanity more fully prepared for the sowing of the Gospel. I sense that the moment has come to commit all of the Church's energies to a new evangelization and to the mission *ad gentes*. No believer in Christ, no institution of the Church can avoid this supreme duty: to proclaim Christ to all peoples.\n\n**CHAPTER I - JESUS CHRIST, THE ONLY SAVIOR**\n\n4. In my first encyclical, in which I set forth the program of my Pontificate, I said that \"the Church's fundamental function in every age, and particularly in ours, is to direct man's gaze, to point the awareness and experience of the whole of humanity toward the mystery of Christ.\" \n\nThe Church's universal mission is born of faith in Jesus Christ, as is stated in our Trinitarian profession of faith: \"I believe in one Lord, Jesus Christ, the only Son of God, eternally begotten of the Father.... For us men and for our salvation he came down from heaven: by the power of the Holy spirit he became incarnate from the Virgin Mary, and was made man.\" \n\nThe redemption event brings salvation to all, \"for each one is included in the mystery of the redemption and with each\none Christ has united himself forever through this mystery. It is only in faith that the Church's mission can be understood and only in faith that it finds its basis.\n\nNevertheless, also as a result of the changes which have taken place in modern times and the spread of new theological ideas, some people wonder: Is missionary work among non-Christians still relevant? Has it not been replaced by inter-religious dialogue? Is not human development an adequate goal of the Church's mission? Does not respect for conscience and for freedom exclude all efforts at conversion? Is it not possible to attain salvation in any religion? Why then should there be missionary activity?\n\n\"No one comes to the Father, but by me\" (Jn 14:6)\n\n5. If we go back to the beginnings of the Church, we find a clear affirmation that Christ is the one Savior of all, the only one able to reveal God and lead to God. In reply to the Jewish religious authorities who question the apostles about the healing of the lame man, Peter says: \"By the name of Jesus Christ of Nazareth whom you crucified, whom God raised from the dead, by him this man is standing before you well.... And there is salvation in no one else, for there is no other name under heaven given among men by which we must be saved\" (Acts 4:10, 12). This statement, which was made to the Sanhedrin, has a universal value, since for all people-Jews and Gentiles alike - salvation can only come from Jesus Christ.\n\nThe universality of this salvation in Christ is asserted throughout the New Testament. St. Paul acknowledges the risen Christ as the Lord. He writes: \"Although there may be so-called gods in heaven or on earth - as indeed there are many 'gods' and many 'lords' - yet for us there is one God, the Father, from whom are all things and for whom we exist, and one Lord, Jesus Christ, through whom are all things and through whom we exist\" (1 Cor 8:5-6). One God and one Lord are asserted by way of contrast to the multitude of \"gods\" and \"lords\" commonly accepted. Paul reacts against the polytheism of the religious environment of his time and emphasizes what is characteristic of the Christian faith: belief in one God and in one Lord sent by God.\n\nIn the Gospel of St. John, this salvific universality of Christ embraces all the aspects of his mission of grace, truth and revelation: the Word is \"the true light that enlightens every man\" (Jn 1:9). And again, \"no one has ever seen God; the only Son, who is in the bosom of the Father, he has made him known\" (Jn 1:18; cf. Mt 11:27). God's revelation becomes definitive and complete through his only-begotten Son: \"In many and various ways God spoke of old to our fathers by the prophets; but in these last days he has spoken to us by a Son, whom he appointed the heir of all things, through whom he also created the world\" (Heb 1:1-2; cf. Jn 14:6). In this definitive Word of his revelation, God has made himself known in the fullest possible way. He has revealed to mankind who he is. This definitive self-revelation of God is the fundamental reason why the Church is\nmissionary by her very nature. She cannot do other than proclaim the Gospel, that is, the fullness of the truth which God has enabled us to know about himself.\n\nChrist is the one mediator between God and mankind: \"For there is one God, and there is one mediator between God and men, the man Christ Jesus, who gave himself as a ransom for all, the testimony to which was borne at the proper time. For this I was appointed a preacher and apostle (I am telling the truth, I am not lying), a teacher of the Gentiles in faith and truth\" (1 Tm 2:5-7; cf. Heb 4:14-16). No one, therefore, can enter into communion with God except through Christ, by the working of the Holy Spirit. Christ's one, universal mediation, far from being an obstacle on the journey toward God, is the way established by God himself, a fact of which Christ is fully aware. Although participated forms of mediation of different kinds and degrees are not excluded, they acquire meaning and value only from Christ's own mediation, and they cannot be understood as parallel or complementary to his.\n\n6. To introduce any sort of separation between the Word and Jesus Christ is contrary to the Christian faith. St. John clearly states that the Word, who \"was in the beginning with God,\" is the very one who \"became flesh\" (Jn 1:2, 14). Jesus is the Incarnate Word—a single and indivisible person. One cannot separate Jesus from the Christ or speak of a \"Jesus of history\" who would differ from the \"Christ of faith.\" The Church acknowledges and confesses Jesus as \"the Christ, the Son of the living God\" (Mt 16:16): Christ is none other than Jesus of Nazareth: he is the Word of God made man for the salvation of all. In Christ \"the whole fullness of deity dwells bodily\" (Col 2:9) and \"from his fullness have we all received\" (Jn 1:16). The \"only Son, who is the bosom of the Father\" (Jn 1:18) is \"the beloved Son, in whom we have redemption.... For in him all the fullness of God was pleased to dwell, and through him to reconcile to himself all things, whether on earth or in heaven, making peace by the blood of his Cross\" (Col 1:13-14, 19-20). It is precisely this uniqueness of Christ which gives him an absolute and universal significance, whereby, while belonging to history, he remains history's center and goal: \"I am the Alpha and the Omega, the first and the last, the beginning and the end\" (Rv 22:13).\n\nThus, although it is legitimate and helpful to consider the various aspects of the mystery of Christ, we must never lose sight of its unity. In the process of discovering and appreciating the manifold gifts—especially the spiritual treasures—that God has bestowed on every people, we cannot separate those gifts from Jesus Christ, who is at the center of God's plan of salvation. Just as \"by his incarnation the Son of God united himself in some sense with every human being,\" so too \"we are obliged to hold that the Holy Spirit offers everyone the possibility of sharing in the Paschal Mystery in a manner known to God.\"§ God's plan is \"to unite all things in Christ, things in heaven and things on earth\" (Eph 1:10).\n\n---\n\nFaith", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " a rota system on a Saturday night and patrol the streets and just talk to people. At the start of the night we hand out ‘spikeys’ which prevent drinks from being spiked. Later on we give out flip flops for ladies with very sore feet and space blankets for those who are cold. We rely on donations to enable us to buy supplies.\n\nWe are from a variety of churches around Kirkcaldy (and beyond) and yes, we do believe in God. We believe we are being guided by God to do this work. We do not have all of the answers but we try our best.\n\nWe have a support group who provide soup and sandwiches for us and a group who pray for us as we carry out this work. We are on the streets from 10pm until 3.30 or 4am. I hope this gives you a better idea about who we are, what we do and why!\n\nAnd, if you meet us in the town centre please don’t be afraid to talk to us - we are human too!!\n\nLiz Smith\nKirk Session and Congregational Board\n\nStarting with this Newsletter, we intend to bring you brief reports of recent Board and Session meetings in order to keep you aware of the nature of discussions and decisions being made.\n\nKirk Session - December Meeting - The following items were discussed at this meeting:\n\n- The Moderator requested that members split into Groups to discuss how the following three topics could be developed.\n - World Mission\n - Christian Education\n - Future use of Buildings\n\nFeedback was presented at the end and collated for future consideration.\n\nPastoral Care – The Moderator provided an update on the last Pastoral Care meeting when it had been agreed the initial focus would be on organising lifts to church, visitations to the housebound and those with difficulty getting out of their homes. The Group are also looking to organise a Bereavement Service in February or March 2012 when bereaved families would be invited to attend a Service on a Sunday afternoon followed by Tea and Coffee.\n\nSamaritans – The Session Clerk reported he had received a letter from the Samaritans thanking the Church for their support.\n\nAfrican Children’s Choir – Brian Booth reported the Choir was planning a Tour between mid September 2012 to January 2013 and he asked if Bennochy Church wished to hold a Concert on 21st September 2012. It was agreed that this would be investigated further.\n\nStained Glass Window – The Moderator reported that it was intended that the stained glass window be installed for the second anniversary of the Union and it was agreed that a Dedication Service would be held on 18th March 2012 in the afternoon.\n\nBusiness Group - George Grant then went through the paper on Communication and explained that it was hoped to arrange an event for all Organisations e.g. a BBQ at the close of their Session so that they could meet members of the Kirk Session. The Kirk Session agreed to this and should be planned for August 2012. It was also agreed to produce a guidance sheet for Elders to complete when doing organisation visits.\n\nThe Group had also discussed a Family Friendly Church and also any other improvements that may be necessary to meet any new needs identified.\n\nBoard Meeting - January 2012 - The following reports were presented to the board meeting\n\nThe Business Committee reported the stained glass window was projected to be completed on time and within budget. They are in the process of looking at more ways of presenting Bennochy as a Family Friendly Church. Also, from presbytery a directive has been received to introduce a stewardship campaign regarding time, talents and money.\n\nThe Finance Team reported that the projected date for the stated AGM will be 25th March. The Church of Scotland are to run a home insurance scheme whereby a £20 donation will be made to the congregation of purchasers. The Bowling Club have donated £500 towards the cost of external lighting. Fife Council have approached the Church with the wish to use our halls for the forthcoming Council Elections.\n\nThe Fabric Committee reported that the work on the roof (at that time) was approximately 60% complete. Also recent storm damage repairs were in hand. An inspection of the lightning conductors will take place on completion of the roof repairs. Refurbishment of the vestry is ongoing. Outside notice boards are almost complete. The kitchen extractor fans repairs are in hand. Maintenance of the grounds is ongoing with removal of the Cherry trees being investigated. Church heating is also being investigated.\n\nA new audio visual system is to be ordered and a budget has been set by the board for this equipment.\nFabric Report\n\nChurch & Halls\n\nFollowing completion of the repair work to the coping stonework of the east and west gables of the Methven Hall etc. the final roof repairs to the Vestry, Office and Halls commenced but was unfortunately damaged by the gales at the beginning of January. Quotations for repair works have been obtained and we await the go-ahead from our insurance company for this work, but in the meantime all roofs have been made watertight.\n\nOur lightning conductor system, which was also subjected to damage during the thefts of lead from the roofs, will be tested and repaired if necessary and this work is expected to commence on 5th March.\n\nAlso, on 5th March, the installation of our stained glass panels in the west window of our Sanctuary is expected to commence following strengthening and decoration work.\n\nInstallation of new external lighting to the Meldrum Road and Elgin Street elevations, together with the CCTV installation to the rear of our buildings are now complete. Due to problems associated with several trees in our grounds, we have had to take down the three trees in the bed on the corner of Meldrum Road and Elgin Street, but it is intended to retain this bed with ground cover and low growing plants, and the removal of the tree canopy will improve the natural light through our new stained glass window. Also, the two tall trees at our main entrance have been trimmed.\n\nHowever, we still require more volunteers to adopt a small plot in our Church grounds and to litter pick on Saturdays. Names should be added to the list next to the plan of the grounds on the main Notice Board at the ramp entrance, or contact myself (202340) or Graham Harrower (201689). Unless we have more volunteers, this work will have to be carried out by contractors, with a consequent drain on our finances.\n\nInternally, the recently fitted electric wall heater in the Prayer Room has not proved capable of heating this area adequately and a further heater from St. Andrews Church is due to be fitted shortly to improve this, although the new heaters in the Elgin Hall have proved to be very effective.\n\nAlterations to the Vestry are now complete and the increased space has made this area much more user friendly.\n\nOur office area is currently undergoing improvements, part of which is designed to improve communications with Elders, Session and Board members and these are now well advanced.\n\nOn a more historical note, during the Christmas Holidays our framed plan of the original St John’s Church hanging in the office area fell down damaging the frame. During repairs it was found that the plan had been inserted in the frame over the top of an illuminated Cradle Roll from St. Johns dating from 1927. A new frame has now been provided for the plan and both now hang from opposite walls in the office area.\n\nNew internal signage is currently in progress to define the designations of various parts of our Halls area viz. Methven Hall, St. Andrews Hall, Elgin Hall and Meldrum Room.\n\nManse\n\nOnly one item from the snagging list remains to be rectified and, on satisfactory completion, the final amount will be paid to the Main Contractor.\n\nFinally, as can be seen from the above, a very considerable amount of work has been and is being done and everyone who has contributed in so many ways has my personal thanks.\n\nAgain, thank you all for your continuing support.\n\nRoddy Sellars\nFabric Convener\n\n- Seen in the ‘Sunday Post’ on 19.2.12 “Aspire to inspire before you expire”\nWhat’s been happening\nChris was part of the team leading a Christian Focus Week at Auchmuty High School in Glenrothes for 1st year pupils. It was an exciting week and gave all in S1 the opportunity to look at the important issues of life and their own character.\nThe first X-Cel took place in December with 34 young people in attendance. This is an event for all church youth groups to meet together. It was a good night with positive views from the youth leaders and young people.\nChris leads a football training club at Fair Isle Primary School every Tuesday after school. This club helps children to work on their football skills and to improve their teamwork.\n\nComing Up\nChris will be a leader at a weekend away in February at Lendrick Muir for P5-S6 pupils. He will also be leading a Primary weekend away at Scoughall in May.\nThe event called \"Strictly Come Praying\" takes place on the 4th of March. This exciting prayer event is for young people aged P7-S6 and includes worship, Bible teaching, workshops, interactive prayer stations and dinner. A number of young people from the Kirkcaldy area will be attending this event.\nChris will be part of a team from SU presenting the “Journey through the Bible” tour in primary schools across Fife in March.\nChris will be co-leading the Fife SU primary event on the 17th of March. This activity time is for primary SU groups in Fife and will be held at Kirkcaldy Ice Arena.\nKART will be holding a prayer supper on the 20th of March at Templehall Church. The focus of the evening will be to pray for the local", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " ... He will not let me go.\n\nFor Christ my Sav-ior loves me so, He will not let me go.\nTake the Name of Jesus With You.\n\nMrs. Lydia Baxter. COPYRIGHT, 1846, BY M. H. DOANE, NEW YORK. W. H. Doane.\n\n1. Take the name of Jesus with you, Child of sorrow and of woe;\n2. Take the name of Jesus ever As a shield from every snare;\n3. O the precious name of Jesus! How it thrills our souls with joy,\n4. At the name of Jesus bowing, Falling prostrate at His feet,\n\nIt will joy and comfort give you, Take it then, wher’er you go.\nIf temptations round you gather, Breathe that holy name in prayer.\nWhen His loving arms receive us, And His songs our tongues employ!\nKing of kings in Heav’n we’ll crown Him, When our journey is complete.\n\nPrecious name, O how sweet! Precious name, O how sweet!\nPrecious name, O how sweet! Precious name, O how sweet!\nPrecious name, O how sweet! Precious name, O how sweet!\nPrecious name, O how sweet!\n\nHope of earth and joy of Heav’n; Precious name, O how sweet!\nHope of earth and joy of Heav’n. Amen.\n1. Just when I need Him, Jesus is near, Just when I falter,\n just when I fear; Ready to help me, ready to cheer,\n Just when I need Him most.\n\n2. Just when I need Him, Jesus is true, Never forsaking\n all the way thru; Giving for burdens pleasures anew,\n Just when I need Him most; Jesus is near to\n\n3. Just when I need Him, Jesus is strong, Bearing my burdens\n all the day long; For all my sorrow giving a song,\n comfort and cheer; Just when I need Him most.\n\n4. Just when I need Him, He is my all, Answering when up\n on Him I call; Tenderly watching lest I should fall,\n Amen.\n1. I was lost in sin, but Jesus rescued me. He's a wonderful Savior to me;\n2. He's a friend so true, so patient and so kind. He's a wonderful Savior to me;\n3. He is always near to comfort and to cheer. He's a wonderful Savior to me;\n4. Dearer grows the love of Jesus day by day. He's a wonderful Savior to me;\n\nSavior to me; I was bound by fear, but Jesus set me free,\nSavior to me; Everything I need in Him I always find,\nSavior to me; (So wonderful) He forgives my sins, He dries my every tear,\nSavior to me; Sweeter is His grace while pressing on my way,\n\nChorus:\n\nHe's a wonderful Savior to me; (So wonderful) For He's a wonderful Savior to me;\n\nSavior to me, wonder-ful! He's a wonderful Savior to me;\n\nI was lost in sin, but Jesus took me in. He's a wonderful Savior to me.\nAre You Washed in the Blood?\n\nH. A. H. \n\nAre you washed in the blood of the Lamb? Are you washed in the blood of the Lamb? Are you washed in the blood of the Lamb?\n\n1. Have you been to Jesus for the cleansing pow'r? Are you washed in the blood of the Lamb? Are you fully trusting in His grace this hour? Are you washed in the blood of the Lamb?\n\n2. Are you walking daily by the Saviour's side? Are you washed in the blood of the Lamb? Do you rest each moment in the Crucified? Are you washed in the blood of the Lamb?\n\n3. When the Bridegroom cometh will your robes be white? Are you washed in the blood of the Lamb? Will your soul be ready for the mansions bright, And be washed in the blood of the Lamb?\n\n4. Lay aside the garments that are stained with sin. And be washed in the blood of the Lamb; There's a fountain flowing for the soul unclean, O be washed in the blood of the Lamb. Are you washed in the blood, Are you washed in the blood, Are your garments spotless? Are they white as snow? Are you washed in the blood of the Lamb?\nSatisfied With Jesus.\n\nB. B. McK.\n\nSlowly.\n\n1. I am satisfied with Jesus, He has done so much for me,\n2. He is with me in my trials, Best of friends of all is He;\n3. I can hear the voice of Jesus Calling out so pleadingly,\n4. When my work on earth is ended, And I cross the mystic sea,\n\nHe has suffered to redeem me, He has died to set me free,\nI can always count on Jesus, Can He always count on me?\n\"Go and win the lost and straying,\" Is He satisfied with me?\nOh, that I could hear Him saying, \"I am satisfied with thee.\"\n\nChorus.\n\nI am satisfied, I am satisfied, I am satisfied with Jesus.\nBut the question comes to me, As I think of Calvary, Is my Master satisfied with me?\n1. When I need some-one in time of grief, Some-one my cheer to be,\n2. When I need some-one to guide my soul O-ver the storm-y sea,\n3. When I need help to de-feat the foe, Some-one my shield to be,\n4. When all my tri-als on earth are o'er, And the dark stream I see,\n\nJesus I choose, for He gives re-lief, He is the best for me.\nAlways to Jesus I give con-trol, He is the best for me.\nAlways to Jesus in faith I go, He is the best for me.\nJesus shall bear me to yonder shore, He is the best for me.\n\nChorus.\n\nI choose Jesus when I need a friend;... What I need I know that He will send;... I have proved Him.\nYes, I choose my Savior always when I need a help-ful friend; What I need I know that surely He to me will free-ly send; I have proved Him o'er and o'er, and\n\ngood and true is He;... I choose Jesus, He is the best for me...\nalways good and true is He; Yes, I choose my Savior dear, He is the best of all for me.\nLoyalty to Christ.\n\nDr. E. T. Cassel.\n\n1. From o-ver hill and plain There comes the signal strain, 'Tis loy-al-ty, loy-al-ty,\n2. O hear, ye brave, the sound That moves the earth around, 'Tis loy-al-ty, loy-al-ty,\n3. Come, join our loy-al throng; We'll rout the giant wrong, 'Tis loy-al-ty, loy-al-ty,\n4. The strength of youth we lay At Je-sus' feet to-day, 'Tis loy-al-ty, loy-al-ty,\n\nloy-al-ty to Christ; Its mus-ic rolls a-long, The hills take up the song,\nloy-al-ty to Christ; A-rise to dare and do, Ring out the watch-word true,\nloy-al-ty to Christ; Where Satan's banners float We'll send the be-gle note,\nloy-al-ty to Christ; His gos-pel we'll pro-claim Thro'-out the world's domain,\n\nOf loy-al-ty, loy-al-ty, Yes, loy-al-ty to Christ. \"On to vic-to-ry! On to\n\nvic-to-ry?\" Cries our great Com-mander; \"On!\" We'll move at His com-mand,\ngreat Com-mander; \"On!\"\n\nWe'll soon possess the land, Thro' loyalty, loyalty, Yes, loy-al-ty to Christ. A-men.\nI Am Thine, O Lord.\n\nFanny J. Crosby.\n\n1. I am Thine, O Lord, I have heard Thy voice, And it told Thy\nlove to me; But I long to rise in the arms of faith, And be\n\n2. Con-se-crate me now to Thy serv-ice, Lord, By the pow’r of\ngrace di-vine; Let my soul look up with a steadfast hope, And my\n\n3. O the pure de-light of a sin-gle hour That be-fore Thy\nthrone I spend, When I kneel in prayer, and with Thee, my God, I com-\nnar-row sea; There are heights of joy that I may not reach Till I\n\n4. There are depths of love that I can-not know Till I cross the\nlove to me; But I long to rise in the arms of faith, And be\ncloser drawn to Thee.\ncloser drawn to Thee.\ncloser drawn to Thee, Draw me near-er, near-er, bless-ed\ncloser drawn to Thee, Draw me near-er, near-er, bless-ed\n\nLord, To the cross where Thou hast died; Draw me near-er, near-er,\nLord, To the cross where Thou hast died; Draw me near-er, near-er,\nLord, To the cross where Thou hast died; Draw me near-er, near-er,\n\nnear-er, bless-ed Lord, To Thy pre-cious, bleed-ing side.\nnear-er, bless-ed Lord, To Thy pre-cious, bleed-ing side.\nnear-er, bless-ed Lord, To Thy pre-cious, bleed-ing side.\n\nA-MEN.\nJesus is Calling.\n\nFanny J.", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": ". How is it possible to turn your cheek to a wicked person? Or, how is it possible for persons to inherit the kingdom of God because of their poverty? The very nature of the aphorisms, and of Jesus' in particular, is the compulsion the listener has to react, to want to know more about what is meant. Crossan (1983) called it the dance of art and thought. The aphorism by nature upsets one's inner balance. Jesus used aphorisms to present a bold and original worldview.\n\nPerdue (1986) concluded that Jesus questioned the validity of the cause-effect worldview of conventional wisdom. Conventional wisdom is based on a theory of retribution in which a righteous individual is materially rewarded and a wicked individual is punished. Jesus' aphorisms about congratulating the poor, hungry, and sad challenges the theory that poverty and hunger are punishments for wickedness. Jesus wanted to prepare hearers for a new reality, the kingdom of God.\nSeveral of the red sayings of Jesus speak of the kingdom of God in parables. These include the parables called Leaven, Mustard Seed, and Vineyard Laborers. Other red parables are the Shrewd Manager and the Samaritan. All are aphoristic in nature, but not in form. The parables shock and disorient, but they are not short sayings. According to Crossan (1973) and most other Biblical scholars, Jesus' use of aphoristic parables was even more distinctive of his voice. Scott (1989) recognized two defining elements concerning the parables of Jesus. First, parables belong to the Jewish literary genre māshāl. The māshāl use connotative language. Connotative language puts a premium on interpretation and on the symbolic. Second, Jesus and rabbis developed the parable. The parable form is not found in the Old Testament. Rabbinic parables developed between 200 and 500 C.E. There is no evidence that the Pharisees, contemporary rabbis of Jesus, used parables.\n\nScott (1989) defined the parable as \"a mashal that employs a short narrative fiction to reference a transcendent symbol\" (p. 8). The term \"parable\" is a Greek word, parabole, which means \"to set aside.\" The basic intent of the parable is comparison. Jesus' parables are characterized as narrative meshalim (the plural form of māshāl) and are not characteristic of the sages. Witherington (1994) suggested that the narrative meshalim, the parable genre used by Jesus, reflected a prophetic adaptation and expansion of wisdom forms. Ben Sira introduced this new development by claiming to be inspired like the prophets, by drawing on prophetic material, and by offering new revelations from God in sapiential forms. Therefore,\nJesus' teaching represented a cross-fertilization of the sapiential and prophetic traditions (Vorster, 1991).\n\nJesus' parables were first heard orally, then later written into sayings documents, and then Gospels. Scott (1989) noted that oral stories are not developed as causative, but rather as additive. In other words, events are layered on without concern for specificity or relationality. Parables are short and clean with explanatory details left out. For instance, in the story of the Vineyard Laborers, the hearers are not told what time of year it was, what was being harvested, or why the later laborers were not seen on earlier visits by the vineyard owner. How the revealed elements of the story do relate is dependent on the interpretation of the parable.\n\nParables are generally hard to understand. Scott (1989) suggested that the reason is that parables are based on concrete thought, not abstract thought. First-century Palestinians were members of a concrete culture. Stories were their vehicles for thinking, not symbolic representations of abstract thoughts. For instance, the story of the Vineyard Laborers might be perceived in our abstract culture as a story about the nature of grace. However, in a concrete culture, Jesus used the story to have his audience think about the way God's kingdom disrupts the usual patron-client relationships.\n\nScott (1989) further clarified that a concrete culture would organize itself through myths. Myths represent the need for order: \"In a myth a thing is sacred because it is in its proper place\" (Scott, 1989, p. 37). If something is out of order, then cultural chaos ensues. A myth takes opposites and provides a resolution. Scott (1989)\nused the example of the Horatio Alger stories which resolved the problem that everyone is created equal but, in reality, not all persons are equal. However, hard work on the part of Horatio Alger bridged the gap between the two realities. He moved from poverty to wealth. Therefore, a myth provides a logical explanation for contradictions.\n\n- Myths provide order and identity for a social group. Therefore, myths are anonymous. Jesus' parables are anti-myths, not myths (Scott, 1989). His stories created a disorder. He took cultural myth themes and aphoristically disoriented the expected outcomes or relationships. For instance, Jesus used the parable of the Mustard Seed to illustrate the kingdom of God, and yet the mustard plant was considered a weed and a nuisance. The audience would have expected that Jesus would have used the mighty cedar, the usual symbol of Israel's greatness, as an illustration of the kingdom of God.\n\n- Jesus was a teacher, but his teaching was radical and was intended to disorient the hearers so that they would consider an alternative worldview. The parables of the Samaritan, the Vineyard Laborers, and the Shrewd Manager are examples of narrative *meshalim*. All three of the parables would disorient the hearers. Even today, the Shrewd Manager is a parable which confuses its hearers. No one expects that an embezzler who tries to save himself by further deceitfulness would be praised by his employer for acting shrewdly.\n\n- Other Jewish parables of the same period usually dealt with the figure of a king and his concerns. Jesus' parables, on the other hand, dealt with ordinary\noccurrences with a paradoxical twist. Vineyard laborers should get paid an honest\nday's wage, but no one would have expected the vineyard owner to pay those who\nworked only an hour the same as the ones who worked all day long. Jesus presented a\ncounter-order that caused persons to entertain a new perspective on reality. Blomberg\n(1990) concluded that Jewish parables supported conventional wisdom and gave\nadded interpretation. Jesus' parables had an eschatological element and were usually\nnot explained.\n\nRabbinic parables were used to illustrate and explain the Torah, but Jesus'\nparables rarely referred to Scripture. Most of Jesus' parables referred to the kingdom\nof God. Much of the debate about the historical Jesus has centered around his use and\nunderstanding of this term, \"kingdom of God.\" Scholars generally do agree that the\nterm \"kingdom of God\" refers to the sovereignty and rule of God (Vorster, 1991).\nThough a full discussion is outside the realm of this study, one important point should\nbe clarified.\n\nScott (1989) believed that Jesus used the term in his parables as a symbol\nrather than as a metaphorical concept. An abstract social group would use the term as\na concept, but a concrete social group would use it as a symbol. A metaphor suggests\nthat one thing is like another (A is B). A symbol suggests that \"the forms do not\nsignify themselves; rather they 'allude to,' hint at a wider meaning\" (Scott, 1989, p.\n58). A symbol is an enigma, representing something which is perceptive and\nexperiential. Therefore, an element of mystery and paradox remain. With a metaphor,\nthe mystery and the paradox can be explained. Most scholars agree that Jesus used the\nterm as a symbol, but they vary in their understanding of its interpretation (e.g., Crossan, 1973; Perrin, 1967; Fiorenza, 1984).\n\nThe important observation is that Jesus used parables to challenge the traditional structural notions of God's kingdom without implying a structural solution. For instance, the parable of Leaven compares the kingdom of God to a woman hiding leaven in flour. The primary associations of God's kingdom are located in male power and in holiness. Therefore, to associate the kingdom of God with a woman hiding a corrupt substance, leaven, would be very disorienting to the listeners. However, it would also be erroneous to conclude that God was female and corrupt, a metaphorical and structural interpretation. As symbol, the parable surprises and pushes the listener to think about the diverse nature of God's kingdom. Jesus used parables to enfold and encompass the symbol of the kingdom of God. Jesus' parables and his sayings are examples of aphoristic discourse heard from an individual voice.\n\n**An Analysis of Jesus' Sayings and Parables**\n\nMembers of the Jesus Seminar isolated Jesus words' from the editorializing and explaining of others on the basis of four assumptions. These assumptions emerged from the careful scholarship of Biblical historical critical scholars. First, Jesus' sayings and parables \"cut against\" social and religious norms. For instance, Jesus said \"When someone sues you for your shirt, let that person have your coat along with it\" (Mt. 5:40).\n\n", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " his patriotism, and said, \"I am not moved by the greatness of the pyramids and their height, nor by the height of the obelisks and their inscriptions, indeed, the numerous antiques of the ancient Egyptians, their inscriptions and workmanship did not excite my soul as much as the example which I saw (in the Pope)\". When Mohammed Ali heard about the incident, he considered this action from the side of the Pope to be an honour to himself and to the Copts, and hurried to thank the Pope. The latter said to him, \"Do not thank someone who fulfilled his duty toward his country which embraces him and his brothers in the same nationality and patriotism.\" The tears flew from Mohammed Ali's eyes, and the church enjoyed freedom and peace.\n\nZahra Pasha, Mohammed Ali's daughter and the wife of Ahmed Bey El-Defterdar, was possessed with an evil spirit and the physicians could not cure her. On the recommendation of some people from the royal palace, Mohammed Ali asked the Pope for help. The Pope sent to him Anba Sarapamon of Menoufia who exorcized the evil spirit by praying.\n\nDuring the reign of Mohammed Ali, his son Ibrahim Pasha called Pope Boutros and asked him about the light that shines out of the holy tomb of Christ on Saturday of the Holy Week. Ibrahim pasha asked to accompany Pope Boutros to Jerusalem to see what happens. When they arrived, Pope Boutros told him that the Roman Orthodox Patriarch is accustomed to enter the tomb for praying before the light's emission, and they were allowed to enter together. The crowd were let out of the church of the Resurrection\nand the door was closed. As the two Patriarchs were praying fervently that God may save His church, the light emitted from the Holy tomb, went around the church and split on the left side of the entrance and was seen by all the crowd.\n\nIbrahim Pasha was known for his love to Egypt and the Egyptians, and he was loved by both, Muslims and Christians. He used to speak only the Arabic language. Since he was asked by one of the soldiers why was he against the Turks although he was one of them, he answered, \"I am not a Turk. I came to Egypt as a young lad, and her sun made me Egyptian and changed my blood...\" Ibrahim ruled Egypt only for a few months at the end of his father's reign.\n\nSAID PASHA'S ERA\n\nSaid Pasha did renew the freedom of worship, in contrary to his predecessor Abbas I who prohibited the Copts from building new churches or even renovating the old ones, and also neglected education in general.\n\nDuring Said's reign, the tribute was lifted up from the Copts and this was proclaimed as a law (firman) in 1855. He also ordered the recruiting of the Copts to the army. This order was abused, as they recruited many Copts who were the only bread-winners in their families, and some of the Copts suffered persecution in the army service to renounce their faith.\n\nPope Kyrillos (Cyril) IV was ordained one year before the beginning of Said's rule, and so he had a chance to practise many progressive efforts, in the spiritual, educational and social fields. One of his patriotic stands was his role in settling the dispute between Egypt and Ethiopia.\nWhen the pope requested the emperor of Ethiopia to cast out the English missionaries, they put agent provocateur between the Pope and the emperor on one hand, and between Said and the Pope on the other hand\\(^3\\), and this ended by poisoning the Pope and his reposal in the Lord.\n\n**KHEDIVE ISMAIL PASHA'S ERA**\n\nWhen Ismail Pasha saw that Pope Demetrius II has great zeal for spreading the education like his predecessor, Pope Kyrillos IV, he granted him 1500 acres of land for building Coptic Schools. He also helped the Pope in opposing the Protestant missionaries, maybe because he thought that they would publicise the oppression of the Egyptian peasants in Europe.\n\nWhen the Protestant denominations attacked the Coptic Church and burnt the icons, Pope Demetrius complained about this act to the Khedive who exiled them. However, the consuls of America and England protected them from being punished.\n\nIsmail Pasha is considered to be the most tolerant ruler of Mohammed Ali's family. He appointed the Copt Wasif Bey Azmi his chief-protocol, and Abd-Allah Bey Serour governor of Qalubia province. He renewed the recruitment of the Copts in the army service in regularity.\n\nWhen the Khedive discussed with Nubar Pasha the election of members of the \"House of Representatives\" he said to him:\"We have also Copts among the elected. We have opened the doors for Muslims and Copts without discrimination.\" Among the members of the \"House of Representatives\" in 1866 there were two Copts: Girgis Barsoum, Mayor of Beni-Salama, and Mkhai Salama,\nMayor of Ashrouba. As we said before there was almost no class at the time of Mohamed Ali because of the monopolization of all sources. Personal ownership started only with Said's regulation in 1858, but it was incomplete until Khedive Ismail opened the door for everybody to work and to own lands. The Copts seized this opportunity and gave attention to commence, particularly with the Sudan, and made great fortunes. Tadros Al- Mankabady in 1884 established an incorporated company in Assuit, to deal with household equipments. From its tithes a land was bought and dedicated to the Coptic School of Assuit. He also promoted the idea of \"Savings\" in 1890 before it was adopted by the Post Office. In 1896 Wisa Doctor's family established a factory for extraction and refinement of sugar from sugarcane, and bought most of the shares of \"Fayoum Train Co.\" Boushra Bey and Senout Bey established a bank in Upper-Egypt to protect the merchants from the greedy moneylenders. High orders were given that some Copts were to be appointed judges.\n\nAs far as the Cabinet is concerned, no Coptic minister was appointed (in the 19th century) until Khedive Abbas' era, when Boutros Ghali Pasha was appointed and remained the only Coptic minister until 1910. Nevertheless, Abbas' era was severe for the Copts as he hated Christianity and expelled many of the Copts from civil service. He requested the Coptic Supervisors (in Revenue Department) to train young Muslim students to take over their places, threatening that if they did not accomplish this within a year they would be thrown into the Nile. Some supervisors noticing after one or two months that the students were not apt for learning and practising the job, were preparing themselves to face death. However, the marvellous hand of God rescued them.\nbecause before the end of the year Abbas fell dead in his palace in 1854.\n\nDuring the era of Tawfik Pasha, who succeeded Ismail Pasha in 1879, a delegation from the Ethiopian emperor visited Egypt and presented valuable gifts to the Khedive and the Pope, asking the Khedive for continuation of the friendly relationship between the two countries.\n\n**ORABIN REVOLUTION**\n\nThe army, which included Muslims and Copts, supported Orabi in his attempt to cast away the foreign influence and stop Khedive Tawfik's tyranny. When the Khedive ordered his dismissal, Arabi asked the Copt Yaqub to call for convening the General Assembly which was held at the ministry of the External Affairs on Saturday July 12, 1882. The meeting was attended by about 500 of the prominent Egyptians. At their forefront were the Sheikh of Al-Azher and Pope Kyrillos V, supporting Orabi. At the populace level both Copts and Muslims offered supplies, and donations flowed to support the army against the British overrun.\n\nThe mob in Alexandria committed a great massacre during which the Christians suffered all kinds of tortures. Some of the Christians from all denominations took refuge in the patriarchate, but the majority of Christians were forced to leave Alexandria. Thus, Orabi's revolution took a religious attitude.\n\nAt the same time, the Mahdi's Revolution took place in Sudan, and before it ended, the Copts fled to Egypt, and the bishop of Sudan and some of the priests and laymen who could not escape were forced to deny their faith and many were martyred.\n2. Tawfik Eskarous: III.\n4. Ibid. p.65.\n6. Ibid., p 610.\nCOPTIC PERSONALITIES IN THE 19TH CENTURY\n\n1. POPE KYRILLOS (CYRIL) IV\n\nFATHER OF THE COPTIC REFORM\n\nPope Kyrillos IV (110th) the greatest Coptic person in the 19th century, led a strong and large state spiritual, scientific and social movement, therefore he is known as the \"Father of the Coptic Reform.\" He established many schools. He opened the first girl's college in Egypt, preceding even the government in female education. He imported the first national printing press from Italy and on its arrival at Alexandria he ordered an impressive official reception of deacons in ecclesiastical vestments chanting hymns all the way from Cairo station to the Patriarchate. He asked Said Pasha the Khedive of Egypt at that time to permit the Copts to be recruited to the army like the Muslims, so that the Copts might not feel that they are foreigners, while they live in their own country. According to Said Pasha's wish he went to Ethiopia to", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " of Cuyahoga Falls v. Buckeye Community Hope Foundation, 538 U.S. 188 (2003), the Court rejected a constitutional challenge to a referendum barring the construction of a low-income housing project. The challenge was brought under the Fourteenth Amendment’s Equal Protection Clause, based on an allegation that the referendum constituted unconstitutional racial discrimination. The Court noted that such a challenge depended on a finding that the government had intentionally discriminated against the plaintiffs on the basis of race. The Court then rejected the plaintiff’s challenge to the referendum on the ground that there was no evidence of the relevant impermissible intent. The Court held that evidence of allegedly discriminatory voter sentiment was insufficient to justify a finding of discriminatory intent. “[S]tates made by private individuals in the course of a citizen-driven petition drive, while sometimes relevant to equal protection analysis . . . do not, in and of themselves, constitute state action for the purposes of the Fourteenth Amendment.” Id. at 196.\n\nOutside the referendum context, the courts often ascribe to government actions the religious motives of private groups supporting those actions. In Edwards v. Aguillard, for example, Justice Powell discussed the religious background and perspective of two private groups—the Institute for Creation Research and the Creation Research Society—that had expressed support for the “balanced treatment” creationism statute adopted by the Louisiana legislature. “Information on both of these organizations is part of the legislative history, and a review of their goals and activities sheds light on the nature of creation science as it was presented to, and understood by, the Louisiana Legislature.” Edwards, 482 U.S. at 601–02 (Powell, J., concurring). For a more recent example of this phenomenon, consider ACLU v. City of Plattsburgh, 358 F.3d 1020 (8th Cir. 2004), where a city accepted a Ten Commandments monument from a private group, the Fraternal Order of Eagles. Id. at 1025. In Plattsburgh, there was no direct evidence of the city’s intent, but the court noted the explicitly religious\napplication of the secular purpose analysis to the Arkansas anti-evolution statute at issue in *Epperson* was not linked as directly to specific statements of governmental policy as the similar secular purpose analysis in cases that the Court would later encounter involving more explicit attempts by state legislatures to incorporate religious doctrine into law.27\n\nIronically, the absence of specific statements expressing the Arkansas government’s purpose in adopting the anti-evolution policy actually strengthens the Court’s holding in *Epperson*. The Court’s determination that state mandates to teach creationism are unconstitutional cannot be limited to situations in which a few public officials make ill-considered public statements about religion. In reaching its conclusion that the amorphous group of voters who voted in favor of the Arkansas initiative did so on the basis of constitutionally impermissible motives, the *Epperson* majority was forced to rely on evidence such as the religious nature of a “typical” political advertisement supporting the initiative,28 a few letters to local newspapers,29 and secondary sources such as academic articles about the nature of the Arkansas statute.30 The major support for the Court’s conclusion that the Arkansas initiative had an impermissible religious purpose, however, was the Court’s analysis of the referendum’s religious effect. In the absence of direct evidence of the state’s impermissible religious purpose, the Court inferred the purpose from the referendum’s inherently religious nature.\n\nThe Court found the religious nature of the statute inescapable. The Court noted that the law singled out only one subject for exclusion from Arkansas classrooms: the theory of evolution. The law was not, therefore, an attempt\n\npurposes of the private group, and held the city accountable for adopting the same religious objectives: “The Eagles donated this monument as a part of its nationwide campaign to spread its version of the Ten Commandments; Plattsmouth’s purpose in erecting it was nothing more complex than the adoption of that goal.” *Id.* at 1037.\n\n27. An excellent example of overtly expressed state intent to adopt religious legislation can be found in the Alabama silent prayer decision. *See Wallace v. Jaffree*, 472 U.S. 38 (1985). In this case the state of Alabama enacted a statute authorizing a period of silence for “meditation or voluntary prayer.” *Id.* at 41 (quoting Ala. Code § 16-1-20.1 (1984)). The Court held that this statute failed the *Lemon* secular purpose requirement. *Id.* at 56. The Court focused much of its attention on statements made by the sponsor of the legislation in the state senate:\n\n“Senator Donald Holmes, inserted into the legislative record—apparently without dissent—a statement indicating that the legislation was an “effort to return voluntary prayer” to the public schools. Later Senator Holmes confirmed this purpose before the District Court. In response to the question whether he had any purpose for the legislation other than returning voluntary prayer to public schools, he stated: “No, I did not have no other purpose in mind.” The State did not present evidence of any secular purpose.\n\n*Id.* at 56–57 (footnotes omitted).\n\n\n29. *Id.*\n\n30. *Id.* at 107 n.15.\nby Arkansas to avoid all sensitive discussions of the origins of humanity. Rather, the “law’s effort was confined to an attempt to blot out a particular theory because of its supposed conflict with the biblical account, literally read.” 31 Nothing in the referendum actually said that the law was intended to protect a particular set of religious dogmas; the Court simply concluded that it could conceive of only one possible explanation for the referendum’s specific focus—i.e., “the belief of some that the Book of Genesis must be the exclusive source of doctrine as to the origin of man.” 32 Thus, although the Epperson Court ostensibly focused on the issue of religious intent, in fact the religious effect of the referendum determined the case. The effect of the statute—that is, to omit from public school curricula any references to evolution—was so permeated with religion that the Court felt it could only have been motivated by an impermissible religious purpose: to protect the dominant religious dogma from other theories that proponents of the dominant religion viewed as sacrilegious.\n\nIn one sense, the very fact that the religious majority deemed the referendum necessary was itself evidence of an impermissible purpose. By enacting a legal mandate to exclude from the state’s classrooms scientific evidence of evolution, the Arkansas religious majority implicitly acknowledged that in an unregulated intellectual marketplace the majority’s religious conception of biological change could not survive on its merits as science. The central holding of Epperson is that the representatives of a politically powerful group have no constitutional authority to skew the intellectual marketplace in favor of that group’s religion. Under Epperson, no group may use the law to artificially bolster the intellectual merits of its own faith’s perspective on scientific issues at the expense of an open intellectual inquiry into those issues—even if the conclusions generated by the open intellectual inquiry inevitably will create doubts among the faithful about the veracity of the dominant faith. As the Court summed up this aspect of Establishment Clause doctrine, “the state has no legitimate interest in protecting any or all religions from views distasteful to them.” 33\n\nThe prohibition of religious protectionism is key to understanding how the Court’s holding in Epperson will apply to later, subtler versions of creationism, such as the theory of intelligent design. The application of the Epperson anti-protectionism principle does not depend on the particular nature of the religious ideas being fostered by the government. Any political attempt to skew the process of scientific investigation in favor of a particular\n\n31. Id. at 109.\n32. Id. at 107.\n33. Id. at 107 (quoting Joseph Burstyn, Inc. v. Wilson, 343 U.S. 495, 505 (1952)) (internal quotations omitted).\nset of religious ideas is invalid—regardless of the mechanism used by the\ngovernment to advance its sectarian agenda. The Constitution therefore\nprohibits statutes that bar the inclusion of evolution in public school curricula\n(as in Epperson), but it also prohibits statutes that mandate the inclusion of\nparticular ideas (as in Edwards v. Aguillard\\textsuperscript{34}) as well as statutes that\ndisparage or disclaim the conclusions of scientific inquiry (as in a recent\nlocal school board policy struck down by the federal courts in Louisiana\\textsuperscript{35}).\nEach type of statute is unconstitutional because it conflicts with the Court’s\nbasic understanding that if creationism has secular merit as science, the\nscientific community will recognize these merits without being forced to do\nso by legal decree.\n\nWhen the courts strike down legal mandates protecting creationism from\nthe challenges posed by evolutionary theory, they are not protecting\nevolutionary theory per se, nor are they attacking the merits of creationism.\nRather, the courts are merely protecting the system of open intellectual\ninquiry from political manipulation directed toward protecting the interests of\npowerful religious groups outside the academic community. In this analysis,\napplying the secular purpose and secular effect tests is simpler than it\notherwise might seem because the Constitution presumptively prohibits \\textit{any}\nlegal mandate to incorporate certain perspectives in a public school\neducational curriculum if those perspectives have been rejected by\noverwhelming numbers of scientists in the academic community. It does not\nmatter whether the religious perspective is obvious on the face of the legal\nmandate; the existence of the mandate itself is the problem. Thus", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-religion", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-religion/part-00-00000.npy", "text": " decided upon this course.53 According to a lengthy, somewhat hagiographic, account of Reggio's hiring written\nby Castiglioni, the community's leaders offered Reggio the post, and he accepted on condition that he not receive the slightest remuneration.\\textsuperscript{54}\n\nReggio's financial circumstances could certainly explain such a magnanimous gesture, but the fact that Isaac's father had also been hired without pay suggests that another consideration was at work. In 1798, following the death of R. Moise Gentili, the ristretta consulta offered Abram Vita the position of acting rabbi. The appointment carried with it no salary because the appointment was a provisional one, and it was provisional because Abram Vita had never been formally ordained. Abram Vita was formally elected rabbi of the Gorizian community only in 1803, after travelling to Ferrara to receive the rabbinical title \\textit{Hakham}.\\textsuperscript{55} Castiglioni's narrative suggests that, like his father, Isaac Reggio was offered the post of acting rabbi, with no salary, because he too had never been formally ordained. This explanation is supported by the fact that following Abram Vita's death in 1841, the Jews of Gorizia also hired his grandson (and Isaac's own son), Abramo, who had completed the program of study at the Paduan rabbinical seminary.\\textsuperscript{57} The community asked him to assume responsibility for issuing decisions on matters of Jewish law and doctrine. He accepted, and held the position for twenty months, until September 4, 1843.\\textsuperscript{58} For those months Isaac and Abramo served together, with Isaac serving as acting rabbi \\textit{(facendo funzioni di rabbino)} for all but halakhic matters.\\textsuperscript{59}\n\nAs for Reggio's ouster, money appears as a factor at all stages: dismissal, rehiring and replacement. At least some of those community members who supported Reggio were presumably motivated by the desire to save the six hundred florins of the Chief Rabbi's annual salary, aside from their regard for Reggio's abilities or their attitudes towards Reform. This is suggested by the final struggle over Reggio's permanent successor. The petition to prevent the hiring of a replacement, signed (as the \\textit{Capi} report) by some of the community's principal taxpayers, lends weight to the mercenary factor.\\textsuperscript{290}\n\nThere is also the possibility that money took second place to ideology in the struggle over Reggio's position. The annulment of Reggio's dismissal in 1850 on technical grounds and the later petition against hiring a replacement can be interpreted as tactical ploys in the struggle against Reform. If so, Reggio's supporters were using a tight-fisted posture to pressure the \\textit{Capi} into rehiring Reggio. In the controversy over Reggio's permanent replacement they employed slander in pursuit of the same goal: by accusing the \\textit{Capi} of religious abuses, the petitioners stigmatized them as impious.\n\nAn ideological reading is even more plausible as far as the \\textit{Capi} are concerned. The fact that dismissing Reggio would cost the community considerable effort and expense indicates the strength of the anti-Reggio camp's ideological motivation.\n\nAuthority is yet another in the web of tightly interwoven forces behind the struggle over Reggio's ouster. The hiring of Isaac's son Abramo as legal expert, however reasonable and appropriate, curbed Reggio's authority as Chief Rabbi. The fact that he had to cede halakhic authority to his son teaches that Isaac's authority never approached that enjoyed by his father, Abram Vita. In the struggle over Reform, or any communal controversy, Isaac's spiritual leadership was weakened by his inadequate halakhic credentials.\n\nAuthority also needs to be factored into our understanding of Isaac's point of view. The last stipulation in clause 35 of the communal regulations required the Chief Rabbi to reach agreement with the \\textit{Capi} and ristretta consulta on reforms to be introduced. These communal leaders were not, after all, scholars in Jewish law, and Reggio may have considered them incompetent to define the nature and scope of the community's halakhic life.\n\n\\section*{V. CONTEXT}\n\nOn August 29, 1855, soon after his ouster, Reggio died. But, having been outmaneuvered on the field of communal politics, he nevertheless managed to have the last word on Reform, with the 1852 publication of his masterpiece, \\textit{Be'ihinat ha-Kabbala}. Was Reggio the heresiarch this book led Rapoport and others to believe? What does the new material on Reggio's career presented in this study teach us about his attitude towards Reform?\nCertainly Isaac supported Reform. He entered the fray in 1835, with a short work favoring abrogation of the taboo on shaving during hol ha-moed. This treatise drew a volley of critical responses, including a rebuttal by his own father, R. Abram Vita. Yet Reggio’s attitude to Reform during the controversy leading to his ouster, coupled with his role in the phylacteries incident of 1835, portrays him in a more conservative and traditional guise, rather than as a radical Reformer.\n\nThe more moderate view of Reggio is thoroughly grounded in his writings, including Behinat ha-Kabbala. Reggio opposed radical reform as vehemently as he opposed rigid orthodoxy. Among the advantages of the rabbinical college he proposed in 1820 was the rabbi’s ability to combat unrestrained attacks on tradition. Reggio excoriated those who rejected the concept of mandatory precepts in favor of a purely spiritual approach to Judaism, as did Aaron Chorin of Hungary. Although he did not consider rabbinic law inviolable, Reggio advocated changing only rabbinic prescriptions that he felt contravened the biblical commandments upon which they were based. Reggio was a Reformer in the sense that he sanctioned deviation from the Shulhan Arukh, but he decried the threat to Judaism posed by the extremist camps of both orthodoxy and Reform.\n\nReggio’s conservatism was typical of the lackluster Italian reaction to the liturgical and curricular initiatives from across the Alps. Naftali Herz Wesseley saw Italian Jewry as a natural ally in the Haskalah campaign. This view was born of the assumption that the Italians were already ‘enlightened’; they knew Italian and heard synagogue sermons in the vernacular. In addition, compared with the Jews of Eastern Europe, their intellectual focus was less single-mindedly talmudic, and more inclined towards Bible, grammar, and the sciences. But the Italians disappointed Wesseley. Endorsing his initiative only halfheartedly, they emphasized the primacy of the established curriculum and the importance of safeguarding tradition. Ironically, it was precisely because Wesseley’s recommendations were already in place that Italian Jewry proved a lethargic ally.\n\nThe weak showing of Reform in Gorizia also mirrors dynamics found in the international arena. Radical Reform did not take off in the Hapsburg realm as it had in Germany. This was partly due to the region’s Catholic identity. Germany’s Protestant environment appears to have had cultural influence on German Reform Judaism, because the latter echoed Protestantism’s emphasis on liturgy and oratory, rather than ritual. Conversely, scholars have attributed the flaccid response to Reform—in Italy as in Vienna—to the stolid conservatism of the surround...\ning Catholic environment, and specifically to the absence of any general concept of theological, institutional, and liturgical Reform. In addition to these forces, in Gorizia the size of the community was also a factor. It seems plain that size affects a community’s social behavior, and hence its response to change. In small intimate communities, anonymity is impossible and social pressures are intensified. These communal quarrels highlight the textured nature of social change. The ideological issues were no different in Gorizia than in the capitals of Europe, but because of its size, money, authority and interpersonal relationships had a magnified impact on the community’s religious life. As much or more than ideological factors, temporal forces were what buffeted and ultimately upended Isaac Reggio.\n\nNotes\n2. Ha-Shahar 1/2 (1869) 12–14. In a footnote to Rapoport’s letter, Peretz Smolenskin, the editor of Ha-Shahar, alludes to Rapoport’s personal resentment of Reggio. For Reggio’s reaction, see Algemeine Zeitung des Judenthums 18 (1854) pp. 73–86. Reggio had clearly gotten under Rapoport’s skin.\n3. Though there have been several sketches of Reggio’s career, his full biography has yet to be written, and his views and social environment have never been systematically analyzed. See Moise Ehrenreich, “Isaac S. Reggio,” L’Educatore Israelita 1 (1856) 74.\n8. Regolamento interno della comunità israelitica di Gorizia, Archivio di Stato di Gorizia (ASG), Capitanato Circolare di Gorizia, busta (b.) 16, fascicolo (fasc.) 172, IV/24, #12 (1850-54). An identical edition was printed in Gorizia, in ", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " were lower than those with H-PW – in the shear rate range examined (50 s⁻¹ - 1500\ns$^{-1}$). Similar behaviour was found for the measurements at 170 °C and 180 °C. The lower viscosity of the blends would imply that it could be more easily melt processed an important consideration in the manufacturing step, if for example sheets of such materials were to be used in construction applications. This is associated with the lower viscosity of molten wax compared with that of hv-HDPE. By increasing the temperature, the total energy added to the system during the mixing process increases and consequently the shear viscosity is expected to decrease. However, as it can be seen from Figure 11 (c), the difference between the shear viscosity of hv-HDPE$_{50}$H-PW$_{50}$ measured at 160 °C, 170 °C and 180 °C cannot be regarded as significant. Similar results were found for hv-HDPE$_{50}$L-PW$_{50}$, Figure 11 (d). This might be explained by that as each blend is consisted of a considerable large proportion of wax with a melting point far below 160 °C, the effect of increment of temperature from 160 °C to 170 °C or from 170 °C to 180 °C on the shear viscosity for the blends is not significant. Thus, 160 °C is an adequate processing temperature. This is an important consideration as the lower the temperature, the less energy required to mix the blend components, but also less evaporation of wax, especially for hv-HDPE/L-PW blends.\n\nTo further investigate the interaction between and dispersion of wax in hv-HDPE, an oscillatory melt rheology study, at low shear rates, was also carried out. Polymers exhibit viscoelastic behaviour which is directly related to molecular structure. In order to evaluate the relationship between molecular structure and viscoelastic behaviour it is necessary to perform rheological experiments in the linear viscoelastic region where the viscoelastic properties observed are independent of imposed stress or strain level. An oscillatory stress sweep test was performed to establish the linear viscoelastic region and determine the maximum stress for linear behaviour at 160 °C. The limit of the viscoelastic regime for each material is determined by the stress value when the moduli ($G'$ and $G''$) start to decrease becoming non-linear. In this study, a stress value of 2Pa was selected as all the samples were in linear viscoelastic region at\nthis value. As shown in Figure 12 (a) and (b), with increasing frequency, the storage modulus $G'$ increased for all samples, approximately by two orders of magnitude. $G'$ of hv-HDPE is higher than the two sets of the blends. With increasing wax content, $G'$ decreased. This is associated with the less viscous property of the waxes at elevated temperatures. However, the plots of hv-HDPE$_{35}$H-PW$_{65}$ and hv-HDPE$_{25}$H-PW$_{75}$ were nearly overlapping, and lie below that for hv-HDPE$_{50}$H-PW$_{50}$, see Figure 12 (a). $G'$ of the three hv-HDPE/L-PW composites were very similar in the low frequency region and separated at high frequencies, as shown in Figure 12 (b). Plots of log shear viscosity $\\eta'$ vs log frequency $f$ are shown in Figure 12 (c) and (d). With increase $f$, $\\eta'$ decreased in all samples. This is because when shear rate increased, the entanglement of the molecular of hv-HDPE decreased. With increasing wax content, the viscosity of all composites decreased, again associated with the less viscous properties of the waxes. However, the difference between the viscosity values of hv-HDPE$_{35}$H-PW$_{65}$ and hv-HDPE$_{25}$H-PW$_{75}$ is not significant. A Cole-Cole plot ($\\log G'$ versus $\\log G''$ plot) is a sensitive tool that can probe composite miscibility/compatibility in that changing slopes of the linear relationship between both parameters can indicate poor interaction, in this instance between hv-HDPE and wax. Curves corresponding to different wax content deviate slightly from each other and from pure hv-HDPE, Figure 12 (e) and (f), and indicated less interaction between hv-HDPE and wax at higher wax loading, evidence for induced heterogeneity within the composite material [50, 51].\n\n4 Conclusions\n\nBoth H-PW and L-PW could be mixed uniformly with hv-HDPE to form SSPCMs using twin screw extrusion, and the blends formed are physical mixes with no evidence of chemical interaction between blend components. The extrusion temperature for hv-HDPE/L-PW blends should not be > 160 °C, as the onset of the evaporation temperature of L-PW is\nrelatively low, \\( \\leq 130 ^\\circ C \\). However, the extent of L-PW evaporation we assume is low as the residence time of L-PW in the extruder is less than 30 sec. No such consideration is required for blends prepared with H-PW. The SSPCMs had latent heats up to 89 J/g (hv-HDPE\\(_{25}\\)H-PW\\(_{75}\\)), as determined from DSC analysis and thus these composite materials are candidates for LHTES applications. The enthalpy of H-PW in SSPCM blends decreased while that of L-PW remained unaltered, as a consequence of co-crystallisation between H-PW and hv-HDPE. DMTA analyses show the plasticising effect of both waxes on the hv-HDPE matrix. The mechanical properties, moduli and stress, irrespective of mode of deformation are much greater for the hv-HDPE/H-PW blends compared with those of the hv-HDPE/L-PW blends at RT. The tensile and flexural strength of hv-HDPE/H-PW blends were much greater than hv-HDPE/L-PW blends at RT. The rheological behaviour of these blends confirmed increased heterogeneity with increasing wax content and that melt processing such SSPCMs with conventional polymer processing techniques should be routine, at least for the wax loadings used in this study. Further studies are ongoing to address some of the many limitations of such SSPCMs [52], e.g. thermal conductivity, and will be reported shortly.\n\nAcknowledgements\n\nMM thanks the UK-China Sciences Bridge Project for financial support, and we acknowledge Mr Graham Garrett and Dr Bronagh Miller for technical assistance.\nReferences\n\n\n18. Zhang, P., et al., *The influence of expanded graphite on thermal properties for paraffin/high density polyethylene/chlorinated paraffin/antimony trioxide as a flame\n\n\n44. Mngomezulu, M.E., *Phase Change Materials Based on Polyethylene, Paraffin Wax and Wood Flour*, 2009, University of the Free State (Qwaqwa Campus).\n\n45. Mochane, M.J., *Polymer Encapsulated Paraffin Wax to be Used as Phase Change Material for Energy Storage*, 2011, University of the Free State (Qwaqwa Campus).\n\n\nTable and Figure Captions\n\nTable 1 Thermal properties of hv-HDPE/H-PW blends (melting) as determined from DSC measurements.\n\nTable 2 Thermal properties of hv-HDPE/L-PW blends (melting) as determined from DSC measurements.\n\nTable 3 Thermal properties of hv-HDPE/H-PW blends (crystallisation) as determined from DSC measurements.\n\nTable 4 Thermal properties of hv-HDPE/L-PW blends (crystallisation) as determined from DSC measurements.\n\nFigure 1 SEM images of (a) surface of hv-HDPE35H-PW65; (b) surface of hv-HDPE35H-LW65; (c) surface of hv-HDPE35H-PW65 after xylene treatment; (d) surface of hv-HDPE35H-PW65 after xylene treatment; (e) fractured surface of hv-HDPE35H-PW65 and (f) fractured surface of hv-HDPE35H-PW65.\n\nFigure 2 FTIR spectra of (a) H-PW, hv-HDPE and hv-HDPE/H-PW blends, and (b) L-PW, hv-HDPE and hv-HDPE/L-PW blends.\n\nFigure 3 XRD diffractograms of (a) H-PW, hv-HDPE and hv-HDPE/H-PW blends, and (b) hv-HDPE and hv-HDPE/L-PW blends.\n\nFigure 4 DSC thermograms for (a) heating curves of H-PW, hv-HDPE and hv-HDPE/H-PW blends; (b) cooling curves of H-PW, hv-HDPE and hv-HDPE/H-PW blends; (c) heating curves of L-PW, hv-HDPE and hv-HDPE/L-PW blends and (d) cooling curves of L-PW, hv-HDPE and hv-HDPE/L-PW blends.\nFigure 5 TGA curves for (", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": "*; and the great hammerhead, *Sphryna mokarran*.\n\n- **HUMAN IMPORTANCE:** The red grouper is both commercially and recreationally important throughout its range, and is one of the most abundant grouper species in southern Florida.\n\n**SCAMP**: *Mycteroperca interstitialis*\n\nInformation from: http://www.fishbase.org/summary/SpeciesSummary.php?id=1211\n\nThe Scamp is found in the Western Atlantic, including the Gulf of Mexico, Bermuda, the Caribbean (mainly insular localities), and Brazil. Found mainly on rocky or coral bottoms from the shoreline to at least 55 m depth; small and middle-sized individuals commonly occur in mangrove-lined lagoons. More common in island waters than along the coast.\n\n- **DISTINGUISHING FEATURES:** Dorsal spines (total): 11 - 11; Dorsal softrays (total): 16 - 18; Anal spines : 3; Anal soft rays: 10 – 12. Tan to brown above, paler below; upper parts of head and most of body usually have small, brown, close-set spots; sometimes uniformly brown. The tricolored pattern of the juveniles mimics that of the juveniles of the clown wrasse, *Halichoeres maculipinna*.\n\n- **SIZE:** Common to about 15 lbs. Maximum size recorded: 84.0 cm. Maximum weight recorded: 10.5kg Maximum reported age: 41 years\n\n- **DIET:** Feeds on smaller fishes.\n\n- **REPRODUCTION:** Sex reversal is observed in this species. The young individual females become male. The scamp is a pelagic spawner.\n\n- **PREDATORS:** Predators of smaller groupers include other groupers and moray eels, larger groupers are likely preyed upon by sharks, among them the sandbar shark, *Carcharhinus plumbeus*; and the great hammerhead, *Sphryna mokarran*.\n\n- **HUMAN IMPORTANCE:** Marketed fresh as food in markets.\nGAG GROUPER: *Mycteroperca microlepis*\nPrepared by: Cathleen Bester\n\nThe gag grouper is found in the western Atlantic Ocean from North Carolina south to the Yucatan Peninsula. Residing in brackish to marine waters, the gag grouper is found offshore on rocky bottom as well as inshore on rocky or grassy bottoms to depths of 500 ft. It is common on rocky ledges along the eastern Gulf of Mexico. Adult gag grouper school in groups of 5-50 individuals or may be found solitary.\n\n- **DISTINGUISHING FEATURES:** The gag grouper is typical among the groupers with an oblong-shaped elongate body. The head is long while the mouth is large with a protruding lower jaw. The bases of the dorsal and anal fins are covered with scales and thick skin. Body color of the gag grouper is dependent upon the sex and age of the fish. Juveniles and mature females are pale to brown-gray with dark blotches and worm-shaped markings resulting in a marbled appearance. Inactive individuals sometimes display a camouflaged pattern with dark brown \"saddles\" separated by white bars just below the dorsal fin. Large mature males are pale to medium gray in color with barely visible reticulations below the dorsal fin. The ventral surface is darker gray to black in color. There are two well-developed canine teeth present anteriorly in each jaw. These are quite effective for holding prey items.\n\n- **SIZE:** Gag grouper reach a maximum total length of 4.75 ft and a maximum weight of 80.5 lbs.\n\n- **DIET:** Adult gag grouper primarily feed on fishes, crabs, shrimps, and cephalopods while juveniles measuring less than 8 in. in length feed on crustaceans residing in shallow grass beds.\n\n- **REPRODUCTION:** Similar to other serranids, gag grouper are protogynous hermaphrodites. They begin life as female, however after a few years of spawning as a female, some gag groupers change sex, becoming functional males. This transition generally occurs at 10-11 yrs of age. Spawning occurs from January through May in the Gulf of Mexico and the South Atlantic Bight at offshore spawning grounds. The fertilized eggs are pelagic and transparent, containing a single oil globule. Eggs hatch after approximately 45 hours at water temperatures of 70ºF (laboratory study). The kite-shaped larvae persist for 40-50 days, as post larvae they migrate from the spawning grounds to inshore seagrasses, mangroves, oyster reefs and salt marshes. Juveniles remain in these locations for approximately 3-5 months before they migrate to offshore reefs.\n\n- **PREDATORS:** Juvenile gag grouper may fall prey to cannibalism as well as to large fishes. Sharks and other large fishes are known predators of adult gag grouper.\n\n- **IMPORTANCE TO HUMANS:** The gag grouper provides important recreational and commercial fisheries. It is caught with hook and line and the flesh is marketed fresh.\nYELLOWTAIL SNAPPER: *Lutjanus chrysurus*\n\nPrepared by: Cathleen Bester\n\nThe yellowtail snapper is found in the western Atlantic Ocean from Massachusetts to Bermuda and southward to southeastern Brazil, including the Gulf of Mexico and Caribbean Sea. It is most common in the Bahamas, off south Florida and in the Caribbean Sea. Adult yellowtail snappers live over sandy areas near deep reefs at depths of 32-230 feet (10-70m), while small adults tend to congregate over hard bottom habitats. Once established, adult yellowtail snapper tend to remain in the same area for long periods of time.\n\n- **DISTINGUISHING FEATURES:** In comparison with most other snapper species the head and mouth of the yellowtail snapper are small. The pectoral fins are long, reaching the anus. An unusual characteristic among snappers in our area, the caudal fin of this species is deeply forked with the upper lobe longer than the lower one. The yellowtail snapper has an olive to bluish back and upper sides with yellow spots. The lower sides and belly have alternating narrow, longitudinal pink and yellow stripes. Perhaps most conspicuously, a prominent midlateral yellow stripe begins at the mouth and continues to the caudal fin base, becoming broader as it passes the dorsal fins. The caudal fin is yellow while the anal and pelvic fins are whitish in color. Although most teeth in the upper jaw are densely packed, fine, or hair like \"villiform\" teeth, there are several canine teeth present as well – the latter constituting a definitive characteristic of all snappers.\n\n- **SIZE:** Adult yellowtail snappers may reach a maximum length of 30 inches. This fish rarely exceeds weights of 5 pounds.\n\n- **DIET:** Adult yellowtail snappers are nocturnal predators. They feed on benthic organisms including crabs, shrimp, cephalopods, worms, and fish. Juveniles, living primarily among seagrasses, feed on plankton.\n\n- **REPRODUCTION:** Spawning occurs year round, peaking at different times in different locations, with an overall activity decline in the winter months. Spawning yellowtail snapper form offshore aggregations. The spherical eggs are released into open waters and contain an oil droplet, which provides buoyancy in their pelagic environment. The eggs hatch within 24 hours, producing sparsely pigmented larvae.\n\n- **PREDATORS:** Natural predators of adult yellowtail snapper include sharks and other large predatory fishes, including barracuda, mackerel and grouper in addition to other snapper species. Larvae and juveniles face a wide array of predators.\n\n**IMPORTANCE TO HUMANS:** The bar jack is a sport fish, caught mainly on light tackle. It also appears in commercial catches made using seines and trawls. Its edibility is fair to good and is marketed fresh in the Bahamas.\nThe black drum is found on the Atlantic coast of the United States, *Pogonias cromis* occurs from southern New England south through Florida and the Gulf of Mexico, to Argentina. It is much more common south of Chesapeake Bay. Juveniles are found more often over muddy bottoms in estuaries. Adults are usually common over sand or sand/mud bottom types in shallow coastal and estuarine waters, especially in high runoff areas, oyster reefs and shell hash. Adults sometimes move onto near-shelf waters, but are primarily estuarine-dwelling and show little migratory behavior.\n\n- **DISTINGUISHING FEATURES:** The head is short with a blunt snout and inferior, horizontal mouth. The chin has 5 pores and 12-13 short barbels set close to the inner edges of the lower jaw. The pharyngeal teeth are small and set in broad bands for effective grinding of mollusk and arthropod shells. The vomer, palatines and tongue lack teeth. Body color in adults is a silver to black base color, highlighted with a coppery or brassy sheen. Fins are dusky to black in color. Young typically have 4-6 vertical black bars along their sides. Coloration may change depending on habitat or age of the fish.\n- **SIZE:** Grows to a maximum size of approximately 170 cm (67 inches) and may weigh as much as 51.3 kg (113.1 pounds", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " for the provider to rectify these as best they can. The provider may (eventually) send out a “super-tech” to go and analyze the problem and attempt to optimize the installation using “free” and off-the-shelf tools such as mobile phone signal strength apps. Alternately,\nthe provider may simply offer Wi-Fi extenders that in their simplest form just reduce overall throughput to half by occupying at least twice as many timeslots for each transmission.\n\nSome providers may choose to offer secondary access points perhaps connected via MoCA or “powerline” (e.g., HomePlug AV2) communication to the master gateway. These have the advantage of offering additional bandwidth without compromising the original access point, provided a second non-overlapping channel is available. Also, the technician may need a little knowledge to correctly position and configure these devices.\n\nIn 2018, Providers began to aggressively install mesh Wi-Fi systems with multiple coordinated access points. This was bolstered by the availability of Wi-Fi Alliance’s EasyMesh standard and certification for Multi-AP.\n\n### 7.3.2 Consumer Self-install\n\nTo avoid the need for the service provider to visit to the end-user’s home, equipment such as set-tops, cable modems, and Wi-Fi APs can be sent by mail for the end user to install and configure or made available for sale (or pickup) at retail kiosks. In particular, the default configuration or capability of the in-home wireless equipment may not always be optimum, though algorithms in the equipment’s firmware do attempt to analyze the area and choose the optimum channel. Basic instructions for optimum placement are included but often a lot of trial and error is needed to improve this. The “obvious” location near the center of the home is not always best for many reasons. The end-user may be reluctant or unable to run additional cabling from the network termination point to a more optimum location for the AP.\n\nCable operators should consider providing more comprehensive instructions with recommendations for optimal AP placement and other setup issues. Alternatively a provider can recommend a mesh or EasyMesh system. The following guidelines can be used by subscribers for self-installs as well as by cable company installers and technicians.\n\nFor best Wi-Fi coverage, try to place the wireless gateway or AP close to where Wi-Fi capable devices are or will be most frequently used. For best Wi-Fi reception and minimal interference, the wireless gateway/AP should be located in an open area away from exterior walls, metal surfaces, microwave ovens and windows (do not place it inside of a cupboard, closet, file cabinet, or other enclosed area). Once the wireless gateway is in the best location in the home, it’s time to plug it in and power it up.\n\nNote: If you are replacing a modem currently connected in the home, be sure to unplug that device from the cable or coaxial outlet and plug the new wireless gateway/AP (often built in to the new modem) into that same coaxial outlet. If you do not have an existing modem set up, simply plug the new modem into the main cable or coaxial outlet in the home.\n\nThe wireless gateway or wireless router makes it easy to set up the Wi-Fi network and adjust its settings. Once you set up the network, you can wirelessly access the Internet and other services from your computer, laptop, game system and more. You can find out how to set up a wireless network with these simple steps.\n\nBefore you can access your provider’s services or the Internet through your wireless gateway, you'll need to make sure it's properly connected. Please check that:\n\nYour wireless gateway is connected to the Internet through the cable connector on the back panel with a coaxial cable (labeled “F” in Figure 4)\nFigure 4 - Wireless gateway connections and controls\n\nWireless gateway back panel features are:\n\n- Reset button for resetting the wireless gateway\n- USB host connector [for future use]\n- Tel1 connector for analog phone line\n- Tel2 connector for analog phone line\n- Gigabit Ethernet (1-4) connectors for use with a computer LAN port\n- Cable connector for the coaxial cable\n- Power connector for the power cord\n\nCheck your specific make and model regarding light indicators, etc., which may be different than what is shown in Figure 4 and Figure 5. Ensure the following: the wireless gateway is plugged in to a power source through the power connector with the provided power cord. The power, US/DS, and online LED indicators on the front panel are steadily lit. This may take several minutes after plugging in your wireless gateway.\n7.3.3. Activating Your Wireless Gateway\n\nNow you are ready to activate your cable company’s services and your wireless gateway. Generic activation information is provided below and specific activation information may be available from the cable company’s web site (refer to the gateway’s printed instructions).\n\nOnce you have installed your wireless gateway/AP and established a temporary Internet connection, you are ready to activate your Internet/voice service.\n\nOnce connected, if you're not automatically presented with an Activation Welcome screen:\n\n1. Open a web browser (such as Chrome, Safari, Internet Explorer, etc.) on your device and go to [provider site]. Next, click Continue.\n2. Enter your account number and phone number (if you received a self-installation kit, the account number can be found on the activation information card inside the kit.). You can also authenticate your account by signing in with your service provider username. If you've already created a username, skip steps 3 through.\n3. Create a username and password. If you have moved and are transferring your service(s) to a new address, click “Sign-in” with your existing username.\n4. Choose a security question and answer (answer must be 3-25 characters long and is case-sensitive) and check the box that you agree to the Terms and Privacy Policy, then click “Continue”.\n o Note: Your username provides access to your account settings and services. It will also become your email address prefix, similar to [Username]@{service provider.net}. Feel free to use it as your\nprimary email account or as a spare. It is recommended that you print or write down this important information.\n\n5. Click “Continue” to proceed from the Connection Established screen.\n\n6. After you receive the “Device Activated” screen, your gateway may reboot. It should be all set when the power, US/DS and online lights on the front of the gateway stop blinking and remain solid for one minute, and the Wi-Fi light(s) start flashing.\n\nNotes:\n\n- You can continue to use the default Wi-Fi network name and password on your device, but it is highly recommended that you change your Wi-Fi network name and password to something easy for you to remember.\n- Depending on the type of gateway you have, you may be required to create a new Wi-Fi network name and password as part of the activation process.\n\n7.4. Qualifying CPE\n\nFor maximum trust any test solution must be capable of testing via the existing or newly installed gateway device. Showing the technician’s equipment working at extreme far range is all well and good, but customers want assurance that their own equipment will work, maybe not as quickly (see below), and that they will have coverage in the home where they need it.\n\nSome providers are now suggesting that their set top boxes for high and ultra-high definition video streaming can be connected wirelessly, reducing the need for additional cabling at the time of installation or encouraging a self-install. If the initial installation attempt does not work, what visibility is there from the customer’s perspective or from the provider’s perspective as to what to try next? Troubleshooting steps are provided elsewhere in this document.\n\n7.5. Customer Education\n\nCustomers often expect the hardware they bought many years ago, perhaps only offering 802.11b capability, to keep on working or even to be improved in performance by updating their gateway/AP. While older equipment will generally still work, they do not understand that operating older equipment will inevitably occupy more timeslots that could carry much higher data rates using more modern modulation profiles and expanded channel widths. Education that older hardware really does need replacing is important.\n\n8. Installation, Configuration and Management\n\n8.1. Common Residential / Commercial Deployment Models\n\n- Wi-Fi Gateway\n- Wi-Fi Gateway with EasyMesh Controller and multiple EasyMesh Agents (APs)\n- Wi-Fi Gateway with Repeater/Extender\n- Wi-Fi Gateway with Secondary Device (Dual AP)\n- Wi-Fi Gateway and Wi-Fi Peripheral\n- Wi-Fi Gateway and Managed Broadband Router\n- Wi-Fi Gateway and Wi-Fi Video AP\n- Wi-Fi Gateway and outdoor (OD) Wi-Fi Gateway\n- Community Wi-Fi Gateway\n8.2. Example Wi-Fi Home\n\nThe average North American home will have almost a dozen Wi-Fi client devices active today. Many industry disruptions such as Internet of Things (IoT) will drive per subscriber Wi-Fi device counts much higher, with some predicting this device count is set to double in just three years.\n\nThere are also many different and often simultaneous use cases for Wi-Fi service occurring in the typical home. Telework VPN and VoIP traffic, Over-The-Top IP Video, Gaming, home automation and security, and general web surfing may all be actively competing for radio airtime.\n\nThe placement of these clients varies and is usually not fixed with perhaps the exception of home automation and security and perhaps gaming consoles. This poses a real challenge as we consider today’s Wi-Fi deployment models beginning with Wi-Fi enabled DOCSIS Gateways.\n\n8.3. Wi-Fi Deployment Models - Gateway Deployment Model (Single AP)\n\nA common scenario in many deployments is the use of a DOCSIS 3.0 or 3.1 cable modem gateway with embedded Wi-Fi access point. The install technician likely locates the gateway near the utility panel or closest to drop entry point to avoid in home coax runs and splitters. There are several disadvantages to this approach depending on the device and the circumstances", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " blood, bacterial or fungal cultures, gill biopsies, and skin scrapings are all moderately damaging to the fish. In addition, these samples can be used to detect diseases from the outside of the fish, but not necessarily the inside. Often for a definitive diagnosis, a sick fish must be euthanized and a post-mortem examination performed to get all needed laboratory samples. This works for disease problems that are occurring in a number of fish: one fish is sacrificed to find a treatment for the others, but does not help to treat an individual fish health problem.\n\nClinical Signs of Disease\nClinical signs of disease in fish can be very vague. Frequently the animal is swimming slowly- often alone, it may swim on its side, the gills may move rapidly, the animal may move rapidly back and forth in one area, the fins are droopy, it doesn't eat, and it may be losing weight. These signs don't tell you much more than that the fish is sick. If that is all you see, without diagnostic tests run by a veterinarian, the only type of treatment that is recommended is isolation in a 0.1% salt bath, perhaps with antibiotics added. Other clinical signs can indicate a specific type of disease, or can be seen with several types of diseases.\n\n- **Skin and mouth ulcers** usually indicate a bacterial infection.\n- **Bleeding** of the skin, fins, mouth or gills can indicate a bacterial or a parasite infection.\n- **Ragged looking fins** can indicate a bacterial or parasite infection.\n- **Fluffy white growth** from the skin usually indicates a fungus infection, but can also be a bacterial infection.\n- **Excessive slime** is a sign of skin irritation. This can be from bacterial or parasite infections, or excessive salt or medication.\n• **Discoloration** of the skin can indicate bacterial infection, some parasitic conditions, poor nutrition, excessive light, or other stress.\n\n• **Bloat** of the abdomen can indicate an internal bacterial or parasitic infection.\n\n• **Bulging of the eyes** can indicate a tumor behind the eye, or a bacterial or parasite infection.\n\n### Bacterial Infections\n\nA variety of bacteria can infect fish and cause clinical signs such as hemorrhage, ulcers, ragged fins, mouth lesions, bloat and bulging of the eyes. These bacteria include species such as *Aeromonas sp*, *Pseudomonas sp*, *Flexibacter columnaris*, *Vibrio anguillarum*, and *Mycobacterium sp*. The only way to definitively identify most bacteria is to culture them, although some can be identified just by using special stains. These tests must be performed by a veterinarian and a diagnostic laboratory. Bacterial infections often require antibiotic therapy, although the **water quality** should also be tested at and the **diet** must be examined to determine if it is optimal for the species in question. Antibiotics that are often used are tetracyclines (minocycline), nitrofurantoin, nalidixic acid, and others. These are available over the counter in pet stores and should be used according to package direction. Antibiotics are usually mixed in the water for convenience, however, antibiotic treated food, or injections of antibiotics are usually more effective. Some bacteria can be resistant to antibiotics and it may be necessary to try a different one if the one does not work. Often for resistant infections, the bacteria must be cultured by a veterinarian and tested for its sensitivity to antibiotics.\n\n### Parasite Infections\n\nThere are a large number of parasites than can infect fishes. These can only be identified by examining them under a microscope. It takes a trained veterinarian or parasitologist to identify these organisms. Parasites can fall into several categories:\n\n• **Protozoa** are one-celled parasites. These include species that live on the skin or in the gills, such as *Ichthyophthirius multifilis* (\"Ich\"), *Cryptokaryon irritans, Ichthyobodo necatrix, Costia necatrix, Chalodonella cyprini, Brooklynella horridus, Odonium, Trichodonids, Tetrahymena pyriformis, Uronema miamiensis, Epistylis sp*, and *Vorticella sp*. Internal protozoans include *Hexamita* and *Spironucleus sp, Plistophora hyphehssobryconis* and other myxosporidia, cryptosporidia and coccidia such as *Eimeria*. The point being, there's a lot of them and they all have names you'll never remember.\n\n• **Helminths** are worms that like Protozoans, can live in different parts of the fishes' bodies. Species such as *Dactylogyris sp, Gyrodactylus* and the Turbellarians live in the skin. Other species live internally such as *Neascus sp, Clinostomum spp, Diplostomulum sp*, tapeworms, *Eustrongylides spp, Capillaria* and *Camallanus spp.*\n\n• **Crustaceans** or shelled animals can act as parasites. Learnea and Ergasilus are species that resemble worm, but are actually copepods. They can parasitize the skin, as can the fish louse, Argulus. Another parasite that has been classified as both a crustacean and as a tepeworm, that can act as a skin parasite is *Livoneca symmetrica.*\nParasites can be treated with a number of drugs. However, as with bacterial infections, parasite problems are almost always secondary to poor water quality. The parasite will live in a symbiotic state with the fish as long as environmental conditions are optimal for the fish. When the animal is stressed, its immune system becomes depressed and the parasites get the upper hand.\n\nSome antiparasitic drugs are specific for a certain category of parasite. Over the counter products are available for common parasites like \"Ich\". Use as directed on the package. Other parasite treatments such as formaldehyde, malachite green, metronidazole, praziquantel, methylene blue, potassium permanganate, acriflavine, nasoten and copper should only be used by persons trained in their use (many of the products are only available to veterinarians).\n\n**Fungal Infections**\nFungal infections are diagnosed by examining a laboratory sample under a microscope, or by culturing the organism. Fungal infections can be extremely difficult to treat in fish. Often the lesion is scraped free of fungus and iodine (povidone iodine, not tincture of iodine) can be applied. Other drugs that are used to treat human fungal infections may also be used. These require daily treatments for several weeks. Overall the prognosis is poor. Fungal infections often occur secondary to an injury or to poor water quality.\n\n**Dietary Deficiencies**\nBecause dietary deficiencies can be extremely complex to sort out, the best approach is to only feed a commercial food for the species you are caring for. Feeding excessive fresh ingredients such as a fish diet, shrimp, tubifex worms, etc. to fish that do not specifically require them will result in deficiencies, as they will eat less of the balanced commercial diet. If you have an unusual species that does not have a commercial diet, consider consulting an expert in the area for dietary recommendations. Otherwise research its feeding habits and use a commercial diet for a comparable type of fish.\n\nThese recommendations on fish health and husbandry are very general. A trained veterinarian or other expert in aquaculture should always be consulted for a problem that does not resolve itself though control of water quality and removal of diseased animals.\n\nMarine Aquarium Chemical Filtration\n\nMarine aquarium chemical filtration is very important in a reef tank but is often misunderstood.\n\nBy J. Charles Delbeek\n\nThe topic of chemical filtration is described in just about every textbook written on marine aquariums, yet few people really seem to understand its capabilities, limitations and applications. There are numerous forms of filtration that could fall under the category of chemical filtration depending on their mode of operation. For the purposes of this article, we will limit our discussion to the common forms of chemical filtration used in reef systems: activated carbon, foam fractionation (also known as protein skimming), molecular adsorbants and ozone.\n\nDue to the various biological processes that occur in an aquarium, a build-up of organic substances takes place. These substances are referred to as organic because they all contain the element carbon in their chemical composition. The list of substances is quite lengthy and includes such items as amino acids, proteins, phenols, creosols, terpenoids, fats, carbohydrates, hydrocarbons, plant hormones, vitamins, carotenoids and various organic acids such as fatty, acetic, lactic, glycolic, malic and citric (deGraaf, 1981; Moe, 1989). Fortunately, these various substances can be lumped together under the all-encompassing term of dissolved organic carbon (DOC). Taken as a whole, these DOCs often have various deleterious effects on aquarium inhabitants, including reduced growth, reduced disease resistance and metabolic stress.\n\nDOCs are processed in different ways in an aquarium. Some are mineralized into ammonia by bacteria present in the tank. The ammonia is then oxidized by nitrifying bacteria into nitrite and then into the final product, nitrate. Unless utilized by plants as food, nitrate tends to accumulate in the aquarium water. Many organic substances are not mineralized but also tend to accumulate in the aquarium. This is why water changes are usually advocated as part of aquarium maintenance. Hobbyists are often under the impression that the purpose of a water change is to lower the nitrate concentration. While water changes do reduce nitrate levels, a more significant result is that the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " taster, and instead of being perceived as ‘sweet’ or ‘savory’, they might both elicit a single pleasurable sensation. The higher-level consequences and central processing of these stimuli will be exciting to examine, as will the question of whether convergently-evolved nectarivorous birds detect and perceive amino acids in a similar fashion. Once new technologies allow for genome-editing, labeling, and tracing of taste-related neurons, comparative studies of taste in birds will provide valuable insights into vertebrate taste biology and the evolution of sensory perception.\n\n\n17. F. Reed Hainsworth, L. L. Wolf, Nectar characteristics and food selection by\n\n\nAppendix\n\nTable S1\n\nNumber of visits of black-chinned hummingbirds in behavioral trials (for Figure 6 and 7A-C)\n\n
\n\n
\n
Type
\n
Stimulus
\n
# visits
\n
\n\n\n
\n
\n
\n
Stimulus
\n
\n
\n
Amino acid
\n
L-Proline
\n
39
\n
\n
\n
Amino acid
\n
D-Asparagine
\n
23
\n
\n
\n
Amino acid
\n
D-Tryptophan
\n
39
\n
\n
\n
Amino acid
\n
D-Phenylalanine
\n
20
\n
\n
\n
Synthetic Sweetener
\n
Cyclamate
\n
61
\n
\n
\n
Synthetic Sweetener
\n
Sucralose
\n
45
\n
\n
\n
Synthetic Sweetener
\n
Acesulfame K
\n
40
\n
\n
\n
Sugar Alcohol
\n
Xylitol
\n
47
\n
\n
\n
Sugar Alcohol
\n
Erythritol
\n
50
\n
\n
\n
Sugar Alcohol
\n
Sorbitol
\n
43
\n
\n\n
\n\nTable S2\n\nNumber of visits of black-chinned hummingbirds in behavioral trials with different concentrations of sucrose (Figure 7D)\n\n
\n\n
\n
Sucrose (M)
\n
0.25
\n
0.5
\n
1
\n
1.5
\n
2
\n
2.5
\n
\n\n\n
\n
25
\n
29
\n
29
\n
29
\n
27
\n
43
\n
\n
\n\n
\nTable S3\n\nNumber of visits of wild hummingbirds in behavioral trials with carbohydrates and sugar alcohols (Figures 11B and C)\n\n
\n\n
\n
Stimulus
\n
# visits of Anna's males in 15 minute trial
\n
\n\n\n
\n
1 = Water
\n
1 2 3
\n
\n
\n
2 = Sucrose 250 mM
\n
12 14 67
\n
\n
\n
3 = Sucrose 500 mM
\n
\n
\n
\n
1 = Glucose 1M
\n
19 70 16
\n
\n
\n
2 = Fructose 1M
\n
\n
\n
\n
3 = Sucrose 1M
\n
\n
\n
\n
Erythritol 2.15 M
\n
37 14 8
\n
\n
\n
1 = Stimulus
\n
\n
\n
\n
2 = Mix
\n
\n
\n
\n
3 = Sucrose
\n
\n
\n
\n
Sorbitol 1.56 M
\n
16 23 46
\n
\n
\n
1 = Stimulus
\n
\n
\n
\n
2 = Mix
\n
\n
\n
\n
3 = Sucrose
\n
\n
\n\n
\n\nTable S4\n\nNumber of visits of wild hummingbirds in behavioral trials with synthetic sweeteners (Figures 11B and 12)\n\n
\n\n
\n
Stimulus
\n
# visits of Anna's males in 15 minute trial
\n
# visits of all birds (first rotation only)
\n
\n\n\n
\n
Aspartame 3 mM*
\n
21 79 42
\n
19 77 104
\n
\n
\n
Aspartame 15 mM
\n
10 50 26
\n
12 53 122
\n
\n
\n
Acesulfame K 50 mM *
\n
10 16 39
\n
30 85 86
\n
\n
\n
Acesulfame K 100 mM
\n
11 10 20
\n
6 16 95
\n
\n
\n
Stimulus
\n
# visits
\n
# visits of Anna's males in 15 minute trial
\n
\n
\n
--------------------------
\n
----------
\n
---------------------------------------------
\n
\n
\n
Cyclamate 10 mM
\n
7
\n
11
\n
\n
\n
Cyclamate 30 mM
\n
3
\n
2
\n
\n
\n
Sucralose 1 mM*
\n
22
\n
10
\n
\n
\n
Sucralose 10 mM
\n
13
\n
24
\n
\n\n
\n\n* for all-bird trial, first ~200 bouts scored\n\nTable S5\n\nNumber of visits of wild hummingbirds in behavioral trials (Figure 13A and B)\n\n
\n\n
\n
Stimulus
\n
Stimulus
\n
Mix
\n
Sucrose
\n
Stimulus
\n
Mix
\n
Sucrose
\n
\n\n\n
\n
5 mM Sucralose 2013
\n
21
\n
65
\n
31
\n
28
\n
68
\n
103
\n
\n
\n
5 mM Sucralose 2014, replicate 1
\n
10
\n
51
\n
32
\n
\n
\n
\n
\n
\n
5 mM Sucralose 2014, replicate 2
\n
17
\n
48
\n
29
\n
\n
\n
\n
\n
\n
5 mM Sucralose 2014, replicate 3
\n
10
\n
27
\n
36
\n
\n
\n
\n
\n\n
\nTable S6\n\nNumber of visits of wild hummingbirds in behavioral trials (Figures 13C and 14A)\n\n
\n\n
\n
Trial
\n
# visits Anna’s males
\n
# visits of all birds
\n
\n\n\n
\n
\n
1
\n
2
\n
\n
\n
1 = 5 mM sucralose
\n
21
\n
22
\n
\n
\n
2 = Water
\n
\n
\n
\n
\n
Splenda ®
\n
15
\n
7
\n
\n
\n
1 = 0.55 mM
\n
\n
\n
\n
\n
2 = 1.38 mM
\n
\n
\n
\n\n\n
\n
\n
/atama/
\n
/oka/
\n
/imata/
\n
\n\n\n
\n
a- 1PL/POSS
\n
[a-á¹tama]
\n
'to see’
\n
‘to kill’
\n
\n
\n
o- 3F/ POSS
\n
[¹o-õka]
\n
\n
\n
\n
\n
hí- 2PL/ POSS
\n
[hí-í¹mata]
\n
\n
\n
\n\n
\nConceivably, if more abstract rules are used, the rule stating the process of vowel lengthening in morpheme boundaries could be generalized to all environments in the language. All long vowels would derive from underlying short ones. Here, however, I will only mention the possibility of such an alternative analysis, reserving such a higher level of abstract generalization to more theoretically based approaches to the data. Such an analysis would be done in an internal reconstruction of the Apurinã phonological system.\n4.0. Introduction\n\nThis chapter describes the word internal structural properties of nouns and their syntactic properties, distinguishing the noun subcategories present in the language. The grammatical bound formatives that are described in this chapter as part of the morphological structure of nouns are those that only occur as part of noun bases. Apurinã also has affix-like forms that occur outside of the morphological formatives inherent to nouns. The majority of such morphological forms belonging to this outer-layer morphology can occur not only with nouns but, also, with verbs, pronouns and/or other closed word classes (depending on the relevant case). In this chapter, I will concentrate on the description of inherently nominal bound formatives, postponing the description of non-inherently nominal affix-like forms to chapter 7, where they will be described as a special class of bound formatives.\n\nThe grammatical properties described in this chapter for nouns will motivate the following nominal categories:\n\n1. Unless it is necessary to distinguish the general word class from its particular subclasses, I will be using the term “category” to refer to a general word class or to its particular subclasses such that, for example, “noun” and “simple noun” will be both be referred to as a “(noun) category”.\n\n149\nIn classificatory nouns, there are:\n\n1. Inalienable Nouns\n2. Non-Inalienable Nouns\n\nIn alienable nouns, there are:\n\n1. Simple Nouns\n2. Mixed Nouns\n3. Compound Nouns\n\nIn mixed nouns, there are:\n\n1. Nouns of the type N\n2. Nouns of the type N\n\nIn productive compound nouns, there are:\n\n1. Nouns of the type N\n2. Nouns of the type N\n\nIn non-productive compound nouns, there are:\n\n1. Nouns of the type N\n2. Nouns of the type N\n\nIn addition to these categories, there is also the following gender categorization that cuts across all the categories given above:\n\n1. Masculine\n2. Feminine\n\nThe notion of “noun” can be grammatically defined in Apurinã in terms of its morphological and syntactic properties. Therefore, the exclusively nominal morphological properties described in the next sections will be taken as the distinctive MORPHOLOGICAL delineation of nouns. Morphological properties that nouns share with verbs will be highlighted, in this work, as outside the domain of intrinsic nominal morphological features and will be described separately in chapter 7. The existence of exclusively nominal morphology was already anticipated in chapter 3, under 3.2.2, (for example, in (4)), where the plural marker was illustrated. Hence, it is morphological\nproperties such as the plural marker, which are intrinsic to nouns, that are described in\ndetail in the rest of this chapter. In addition to specific morphological properties, nouns\nalso have particular syntactic properties (such as, for example, distribution in larger units)\nwhich distinguish them from verbs, pronouns etc., as will be made explicit in the\nfollowing subsections in this chapter.\n\n4.1. Simple Nouns And Alienability\n\nAn underived noun (i.e. a noun that is not derived from another word category)\ncan be minimally a bare root which is intrinsically nominal (i.e. can take exclusively\nnominal morphology). For instance, the words kema ‘tapir’ and anāpa ‘dog’ cannot be\nreanalyzed into smaller morphological elements and can only behave as nouns in the\nlanguage. Nouns which have only one root are simple nouns. The following word\nformation rule (i.e. rewriting rule), thus, represents the simplest type of noun structure\npossible, one that states that a noun (i.e. N) can be realized as a bare root (i.e. Rt):\n\n3. N → Rt\n\nWhile some simple nouns are lexically marked\\(^2\\) to be obligatorily possessed,\nothers are not.\\(^3\\) Obligatorily possessed simple nouns are labeled inalienable nouns,\nwhereas non-obligatorily possessed simple nouns are labeled alienable nouns. The\ninalienable versus alienable distinction is reflected in the morphological marking patterns\n\n\\(^2\\) “Lexically marked” properties are those that are part of the meaning of a lexical entry. Hence obligatory possession\nand unpossession are lexically marked in simple nouns because each lexical entry for simple nouns either is\nobligatorily possessed or is not.\n\n\\(^3\\) The present analysis differs from previous ones (cf. Facundes 1994a, 1995) in that the nouns which were there\nanalyzed as lexically marked for obligatory unpossession are here being analyzed as simply not having the property\ndescribed next. Some of the formatives involved in the marking patterns of simple nouns will be shown later, in section 4.3, to occur also with verb bases as nominalizers. Since the purpose of this section is to describe the morphological and syntactic factors that motivate the different lexical categories of nouns found in the language, I will, for the moment, ignore such additional functions of these formatives, returning to them in 4.3.\n\n4.1.1 Simple Inalienable Nouns\n\nInalienable nouns belong to the class of simple nouns insofar as they comprise a single root. Inalienable nouns are obligatorily possessed, require no morphological marker to occur possessed, and, also, require a morphological marker (i.e. -txi) to occur unpossessed (in the cases where the semantics/pragmatics allows for the noun to occur unpossessed). As an example, the word kuwu by itself means ‘head of’, not simply ‘head’. Thus, in order to express the concept ‘head’ without specifying whose head it is, one needs to say kuwî-txi. The inalienable noun kuwu is further illustrated in the clausal contexts given below. In (4a) kuwu is the possessed noun in the construction kema kuwu ‘tapir’s head’. In (4b) kuwu requires the -txi unpossessed marker because it occurs unpossessed:\n\n4a. [kema kuwu] mipa atama-ta\n tapir head.of Mipa look-VBLZ\n ‘Mipa looked at the tapir’s head.’\n\n4 The nasalization of the root final vowel when preceding the suffix -txi is a property of RINAL morphemes described in detail in 4.4.3.\nb. [kuwī-txi] su-pe\n head.of-UNPOSS go-PFTV\n ‘The head person left.’ (In this case ‘head’ refers to a mythological personage who only\n exists as a head, with no other body parts.)\n\n In (4), as everywhere else in this work, inalienable nouns are glossed as ‘N of’,\n where “N” is the lexical meaning of the inalienable noun in question and “of” marks it as\n obligatorily possessed. Thus, in the analysis proposed here, obligatory possession is part\n of the lexical entry of inalienable nouns; that is, it is stored with the lexical entries of\n inalienable nouns, rather than added by morphosyntactic rules. As seen (4a), no\n morphological marker is added when an inalienable noun occurs possessed, and, as a\n consequence, the syntactic context in which inalienable nouns occur possessed is one\n where two nouns are placed together by juxtaposition. On the other hand, when\n inalienable nouns occur unpossessed they require the presence of the unpossession\n marker -txi:\n\n The example given in (4) may suggest that possession constructions such as\n [kema kuwu] can be described purely in terms of the syntactic structure internal to the\n nominal phrase. In this case, the possession relation would not be marked by any lexical\n property of the possessed noun but, instead, by a syntactic distribution in which the\n possessor would always precede the possessed noun. However, while this “precedence\n rule” is a necessary part of the grammar of possession constructions in the language, it is\n not sufficient to describe them. The reason is a twofold one: First, it is necessary to refer\n to the lexical property of inalien", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " assisted by the government which assumed control over all the natural water resources in the State in 1886 (Eastburn 1990).\n\nThe most audacious irrigation project took shape at Mildura. In 1884 Canadian-born brothers George and Ben Chaffey were invited by the Victorian government to establish an irrigation settlement on the Murray (Davies 1978). The Chaffeys were granted 50,000 acres of rabbit-infested land which they cleared, subdivided and serviced with water channels. Huge pumps were placed in 1889 at psyche Bend where water was drawn from the Murray and pumped to Kings Billabong. From there, through a series of pumps and open channels it was distributed throughout the area. At psyche Bend the steam engine drove three centrifugal pumps, each delivering 8000 gallons of water per minute.\n\nUltimately, irrigation along the Murray was not the success it was envisaged by government or farmers. Environmentally, it was disastrous. The waste of water through evaporation and seepage was enormous. Worse still was the effect of clearing and ploughing on vast areas inland from the river. This allowed rain to run straight into the subsoil raising the water table and bringing saline groundwater close to the soil surface. The introduction of irrigation water exacerbated the problem. Irrigation-\ninduced salinisation was recorded at Mildura as early as 1895 (Eastburn 1990). By 1911 it appeared near Cohuna and Kerang. Today it affects virtually all regional settings along the river, including the highlands, the riverine plain and the mallee of the Murray-Darling Basin.\n\nTimber reserves and state forests\n\nThe first attempts to control land and resources along the Murray came in 1865 when the Victorian government gave itself the power to proclaim reserves for the ‘preservation and growth of timber’ (Wright 1989: 107). By the close of the decade 276,116 acres had been set aside as state forests and timber reserves, including the Barmah Forest of 19,600 acres, created in 1869 (Wright 1989). Further reserves were created at places like Gunbower Island, Nyab and Walpolla, partly to halt the damage being done to River Red Gum forests as a result of unregulated harvesting, but also to secure a valuable economic resource.\n\nThese developments were not motivated by ecological intent. Government action was propelled largely by utilitarian concerns. Red Gum forests along the Murray continued to be heavily exploited for mill logs. During the nineteenth century, sawmillers had only to pay £15 to set up a mill in the forest, and for £10 for cartage and £5 for each man employed in felling timber, he could fell the pick of the trees in the forest (Fahey 1987). In the Barmah Forest the Red Gum trade flourished, prompting one observer to claim that the timber was an ‘object of worship on the Murray’.\n\nThe mills declare dividends because of it; the sleeper-cutter keeps the pot boiling in return for his daily sweat upon it. The bullock driver draws his Saturday night beer from it. The axeman’s camp in the bush is kept supplied in tucker by it. The barge-master, the deck hand, and the skipper of the river tramp knows its value well (Brady 1912, cited in Hibbins 1991: 38).\n\nThe 1901 Royal Commission on State Forests and Timber Reserves reported critically on the use and management of the\n\nA load of Red Gum timber arrives at the Evans Bros sawmill in Echuca, 1923. (Historic Places Section, DNRF)\n\nBarmah Forest. The Commission noted that the forest had been cut over several times, and that at the current rates of cutting, the forest would not yield five years’ supply (Fahey 1987).\n\nA similar pattern of use developed in most of the Red Gum forests along the river. By 1932 the district forester at Swan Hill reported that all the red gum at Annuello, Mamboing and Toll Toll had been cut out (Hattah-Kulkyne National Park’ Resource Collection File F/C: 3/1).\n\nIt took many decades for the State’s forests to be placed under more effective management. Although a series of bills specifically for forest legislation were introduced into parliament, in 1879, 1881, 1887 and 1892, none was enacted. Finally, in 1907 a Forests Act was passed, which provided for the establishment of a State Forests Department under a Minister of Forests. A Conservator of Forests was appointed, with appropriate supporting staff and power to declare permanent forest reserve (Moulds 1991). Over the next decade, several initiatives were undertaken, including improvement works on the forest estate, the establishment of hardwood plantations and improved fire protection measures.\n\nFrom the 1920s foresters based at Ouyen, Swan Hill, Nyah and Mildura made attempts to re-afforest native pine areas. Unfortunately, until the 1960s these efforts were largely unsuccessful. In the Barmah Forest, thinning and coppice treatment was carried out in the 1920s and 1930s. Foresters also experimented with non-indigenous species. At the Timbooo Forest in the 1930s Red Ironbark Eucalyptus sideroxylon and Silky Oak Grevillea robust-\nta were trialed ('Hattah-Kulkyne National Park' Resource Collection File).\n\nForesters were often the first advocates for conservation. It was at their insistence, during the 1930s, that settlers in the Hattah-Kulkyne area were forbidden to remove native pines from their selections. In the Barmah Forest in the 1940s foresters and scientists began to re-assess the impact of grazing. Forester, WP Tingate drew attention to the damage done to saplings by cattle, ‘When grass was dry’ he said, ‘cattle would eat anything green’. Tingate’s concerns were echoed by his colleague, Stan Duncan, who observed in 1950 that there was little hope for widespread regeneration of the forest until grazing was discontinued. The Forests Commission acted on this advice and in 1950 Barmah West, Yalca and portions of Yelliclina were closed to cattle (Fahey 1987).\n\nWater reserves\n\nAnother government concern of the 1870s and 1880s was the need to protect water resources from the designs of squatters and selectors. Thus, in 1881 all unalienated land within one to one-and-a-half chains of the colony’s ‘Rivers, Rivulets, Creeks, Channels, Aqueducts, Lakes, Reservoirs, Swamps, Inlets, Loughs and Straits’ was reserved (Wright 1989: 224). The order ensured the Murray River water frontage was retained in public ownership and today this corridor forms the basis of the Murray River Reserves managed by Parks Victoria.\n\nNational parks\n\nFor many conservation-minded people, the creation of State forests and Crown land reserves was not enough. Towards the end of the nineteenth century a growing body of scientific opinion became increasingly vocal in their demands for the protection of wildlife and the establishment of national parks. In the broader community too there was a growing awareness of the natural world. Changing recreation patterns brought about by extensions to the rail network and the emergence of field naturalist and bushwalking clubs awakened people to the beauties of nature.\n\nThe Field Naturalists Club of Victoria (FNCV) was one of the first supporters of national parks. Established in 1880, the FNCV combined the desire for open air recreation with an interest in the natural environment. The Club instituted walking and camping expeditions in which the observation of wildlife and the collection of botanical specimens were important activities. The FNCV was soon joined by other societies, including the Wattle Club, the Royal Australasian Ornithologists Union, and the Bird Observers Club. This small but committed conservation movement, led by influential spokesmen like Baldwin Spencer and Sir James Barrett, began to exert pressure on the government to protect Victoria’s bushland.\n\nIn 1914, the FNCV became interested in the Hattah Lakes system near Mildura. At its meeting on 14 December the Club decided to write to the Fisheries and Game Department and request that the area be proclaimed a sanctuary for native game. Native game sanctuaries were proclaimed under the Game Act of 1890 and made it unlawful for any person to kill any native game within a designated area and specifically mentioned by proclamation (Mahon 1992). Of particular concern to the FNCV was the practice of punt-gun shooting on Lake Mornpall. Speaking for the resolution, JG O’Donoghue reported on a recent visit to the Lake where he claimed that, after a single discharge of the gun used by one individual, as many as 72 pairs of ducks had been ‘picked up’ (The Victorian Naturalist 1915: 31). The resolution was supported by the Inspector of Fisheries and Game, Mr F Lewis, and in 1915 an extensive area embracing parts of Chalka Creek, Lakes Hattah, Little Hattah, Mornpall and Brookie, together with all land", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": " \\mapsto a_3 v_7 \\mapsto a_3^2 v_3 \\mapsto 0; \\]\n\\[ v_9 \\mapsto a_3 v_6 \\mapsto a_3^2 v_2 \\mapsto 0; \\]\n\\[ v_8 \\mapsto a_3 v_4 \\mapsto a_3^2 v_1 \\mapsto 0; \\]\n\\[ v_5 - \\frac{b}{a_3} v_4 \\mapsto 0. \\]\n\nWe therefore see that the Jordan type of \\( A \\) is \\((3^3, 1) = (\\rho_3(9), 1)\\), noting that \\( \\rho_3(9) \\) is the Jordan type of \\( A' \\). The basis with respect to which \\( A \\) has Jordan normal form is \\( \\{v_{10}, Av_{10}, A^2v_{10}, v_9, Av_9, A^2v_9, v_8, Av_8, A^2v_8, v_5 - \\frac{b}{a_3} v_4\\} \\). In general, if \\( i \\) is minimal such that \\( a_i \\neq 0 \\), we can use this method to show that the Jordan type of \\( A \\) is \\((\\rho_i(9), 1)\\).\n\nThe case that \\( b = 0 \\) and \\( c \\neq 0 \\) is for the most part similar. We illustrate this with the example of \\( a_3 \\neq 0 \\neq c \\) and \\( a_i = b = 0 \\) for \\( i \\neq 3 \\). By drawing lines on the Dynkin pyramid in the same way as the \\( b \\neq 0 \\) example above, we obtain:\n\nIn particular, we have \\( v_{10} \\mapsto a_3 v_7 + cv_5 \\mapsto a_3^2 v_3 \\mapsto 0 \\); that is to say, \\( A \\) maps \\( v_{10} \\) to 0 in two steps via \\( v_5 \\), but in three steps via the long block of the Dynkin pyramid. We say that the string \\( v_{10} \\mapsto a_3 v_7 \\mapsto a_3^2 v_3 \\mapsto 0 \\) subsumes the string \\( v_{10} \\mapsto cv_5 \\mapsto 0 \\).\n\nThis then gives a Jordan type of \\((3^3, 1) = (\\rho_3(9), 1)\\) with respect to the basis \\( \\{v_{10}, Av_{10}, A^2v_{10}, v_9, Av_9, A^2v_9, v_8, Av_8, A^2v_8, v_5\\} \\).\n\nAs in the previous cases, we can alter the non-zero \\( a_i \\) to find matrices which have all Jordan types of the form \\((\\rho_j(9), 1)\\).\n\nFinally we consider the case that \\( b \\neq 0 \\neq c \\). If \\( a_i = 0 \\) for all \\( i \\), then we have \\( v_{10} \\mapsto cv_5 \\mapsto bcv_1 \\mapsto 0 \\), and \\( v_j \\mapsto 0 \\) for all \\( j \\neq 10, 5, 1 \\). So here we find that \\( A \\) has Jordan type \\((3, 1^7)\\).\nIt remains to consider which Jordan types occur in this case for the possible choices of non-zero $a_i$.\n\nFirst, suppose that $a_3 \\neq 0$ and $a_i = 0$ otherwise. Here the Jordan type of $A'$ is $(3^3) = \\rho_3(9)$, and we obtain\n\n$$v_{10} \\mapsto a_3 v_7 + cv_5 \\mapsto a_3^2 v_3 + bc v_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_3 v_6 \\mapsto a_3^2 v_2 \\mapsto 0;$$\n$$v_8 \\mapsto a_3 v_4 \\mapsto a_3^2 v_1 \\mapsto 0;$$\n$$v_5 - \\frac{b}{a_3} v_4 \\mapsto 0.$$\n\nConsequently we find that the Jordan type of $A$ is $(3^3, 1) = (\\rho_3(9), 1)$.\n\nThe cases of $a_2 \\neq 0$ and $a_1 \\neq 0$ are treated in the same way, and in each case we obtain a Jordan type of $(\\rho_i(9), 1)$. In effect, in these cases the string\n\n$$v_{10} \\mapsto cv_5 \\mapsto bcv_1 \\mapsto 0$$\n\nis subsumed into the string arising from the largest Jordan block of $A'$.\n\nNext, the case of $a_4 \\neq 0$ and $a_i = 0$ otherwise requires a closer look. In this case the Jordan type of $A'$ is $\\rho_4(9) = (3, 2^3)$, and we may represent this by drawing the following lines on the Dynkin pyramid:\n\nNow we have $v_{10} \\mapsto a_4 v_6 + cv_5 \\mapsto (a_4^2 + bc) v_1$; so the Jordan type of $A$ now depends on whether or not we have $a_4^2 + bc = 0$. \n\n63\nIf it is the case that $a_4^2 + bc = 0$, then we have the following:\n\n$$v_10 \\mapsto a_4 v_6 + cv_5 \\mapsto (a_4^2 + bc)v_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_4 v_4 \\mapsto 0;$$\n$$v_8 \\mapsto a_4 v_3 \\mapsto 0;$$\n$$v_7 \\mapsto a_4 v_2 \\mapsto 0;$$\n$$v_5 \\mapsto bv_1 \\mapsto 0.$$\n\nWe thus see that $A$ has Jordan type $(2^5)$ in this case, with respect to the basis \\{v_{10}, Av_{10}, v_9, Av_9, v_8Av_8, v_7, Av_7, v_5, Av_5\\}.\n\nConversely suppose that $a_4^2 + bc \\neq 0$. Then we have:\n\n$$v_10 \\mapsto a_4 v_6 + cv_5 \\mapsto (a_4^2 + bc)v_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_4 v_4 \\mapsto 0;$$\n$$v_8 \\mapsto a_4 v_3 \\mapsto 0;$$\n$$v_7 \\mapsto a_4 v_2 \\mapsto 0;$$\n$$v_5 - \\frac{b}{a_5} v_6 \\mapsto 0.$$\n\nThus we find that $A$ has Jordan type $(3, 2^3, 1)$.\n\nNow suppose that $a_5 \\neq 0$, and $a_i = 0$ otherwise. In this case the Jordan type of $A'$ is $\\rho_5(9) = (2^4, 1)$. We then find the following:\n\n$$v_{10} \\mapsto cv_5 + a_5 v_4 \\mapsto bcv_1 \\mapsto 0;$$\n$$v_9 \\mapsto a_5 v_3 \\mapsto 0;$$\n$$v_8 \\mapsto a_5 v_2 \\mapsto 0;$$\n$$v_5 - \\frac{b}{a_5} v_7 \\mapsto 0;$$\n$$v_6 \\mapsto 0;$$\n$$v_4 \\mapsto 0.$$\nIn this case also, we see that $A$ has Jordan type $(3, 2^2, 1^3)$. Finally, we can use the exact same argument to show that if $a_6 \\neq 0$ (respectively, $a_7 \\neq 0$ and $a_8 \\neq 0$) and $a_i = 0$ otherwise, then in this case $A$ has Jordan type $(3, 2, 1^5)$ (respectively, $(3, 1^7)$ and $(3, 1^7)$). We conclude by observing that we have obtained matrices in the centraliser of $D(9, 1)$ of each of the Jordan types described in Proposition 4.2.3.\n\nHaving shown that Proposition 4.2.3 holds in $\\mathfrak{gl}_{10}(k)$", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part1/part-00-00000.npy", "text": "tr>\n
\n
\n
φ = 0 ~ 33; C = 23~36 kg/cm²
\n
\n
\n
\n
C = 18 ~ 24 kg/cm³ ; f = 1,0
\n
\n
\n
3. Unconfine
\n
C = kg/cm³ ; f = ~ 1,2
\n
\n
\n
\n
C = kg/cm³ ; f = ~
\n
\n
\n
4. Consolidation
\n
Pc = 1,4 ~ 1,7 kg/cm² ; Cv = 0,00161 to 0,00169 cm²/sec
\n
\n
\n
\n
Pc = 1,31,7 kg/cm² ; Cv = 0,001580,00210 cm²/sec
\n
\n
\n
5. Swelling
\n
k = 0,590 ~ 0,913%
\n
\n
\n
\n
k = ~ %
\n
\n\n
\n\n**Figure 7. Topography of the study area**\n\n**Tabel 2. Parameter tanah sebagai input pada pemodelan**\n\n
\n2.5 Conclusion\n\nThis chapter identified techniques used to determine elephant body condition of both African and Asian elephants. The studies revealed that measuring body condition of elephants using physical body scores has been used for a long time and is still used. Furthermore, literature revealed that there has been a relationship between strongyle parasites and body condition. Another highlight is that nutrition composition of elephant feed is not well studied, and hence the nutritional requirements for elephants are not clear. Studies investigating the relationship between individual nutrition and body condition are limited. What is also evident from literature is that the Asian elephants are far better studied than wild African elephants. Many African elephant studies have been done in Kenya and Uganda, and there is very little research conducted on elephants in Namibia.\nCHAPTER 3\nMATERIALS AND METHODS\n\nThis study was conducted with permission from the Ministry of Environment and Tourism under the supervision of the University of Namibia and a non-profitable organisation, Utopia Scientific. Data were collected during winter of 2012 and 2013 from June to August, this allowed for comparison of elephant body condition during winter over a period of two years.\n\n3.1 Study Area\n\nThe study was conducted in Etosha National Park, one of southern Africa’s most important game reserves, located at latitude 18° 94’ 53”S and longitude 15° 89’ 78”E and it covers an area of 22,270 km² (du Plessis, 2001). In its centre is a salt pan which covers 40% of the park (du Plessis, 2001). The park has high biodiversity with grass and thorn savannah and Mopane bush land in the west and dry forests in the north-east (de Beer et al., 2005). The coolest and dry months are May to September, while the rainy season is from November to March. Average daily", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " available magnetization, and neglecting relaxation effects and pulse imperfections, increases the signal-to-noise (S/N) ratio relative to a reference spectrum, albeit only for a subset of signals. It is this aspect that is of particular interest to reaction monitoring, where maximizing sensitivity can be highly beneficial. Below we present the design and implementation of a new pure-shift method, explore its scope and limitations, and demonstrate its application in the analysis of the kinetics of chemical reactions and equilibria by \\(^{19}F\\) and \\(^31P\\) NMR.\nEXPERIMENTAL SECTION\n\nNMR Experiments. The $^{19}$F spectra were acquired on a two-channel 400 MHz Bruker Avance III NMR spectrometer equipped with a Prodigy probe or on a three-channel 400 MHz Bruker Avance III NMR spectrometer equipped with a 5 mm z gradient BB TBO H, $^{19}$F probe. The $^{19}$F spectra of 1 in CDCl$_3$ presented in Figure 2 were acquired using the following parameters: relaxation and nominal acquisition times of 1.5 and 17.4 s, respectively, two dummy scans and 4 scans were accumulated. The $^{19}$F SHARP spectrum was acquired using the pulse sequence of Figure 1, 17 and 34 µs 90° and 180° pulses, respectively, $n = 256$, 34 ms chunk time and the overall acquisition time per one scan of 17.9 s.\n\nThe $^{19}$F SHARP spectra of a mixture of 3 and 4 in a mixture of 1:1 CD$_3$OD/H$_2$O presented in Figure 4 were acquired using the pulse sequence of Figure 3. $n = 128$, 13.6 ms acquisition chunks, 10 ms 180° sinc pulse during the initial SPFGSE. The relaxation and the nominal acquisition time of 10 and 3.49 s were used, respectively. Two dummy scans and four scans were accumulated. The spectra were processed by applying a 0.1 Hz exponential line broadening and a forward complex linear prediction (the stated signals half-height linewidths quote values without this additional line broadening). The $^{19}$F SHARP spectra of Figure 5 were acquired using identical parameters as used for the spectra of Figure 4, but with the $x$, $y$, $z$, $z'$, $x$, $y$, and $y'$ shim corrections deviating by + 500 units from their optimal values.\n\nThe $^{19}$F SHARP spectra of 1 presented in Figure 6 were acquired using the pulse sequence of Figure 1. The relaxation and the nominal acquisition times of 3 and 1.09 s were used, respectively. The loop parameter $n$ was set to 64, 128, 256 or 512, yielding acquisition chunks of 8.5, 4.25, 2.13 and 1.06 ms; 70 µs 180° $^{19}$F pulses were applied during acquisition. Two dummy scans and two scans were accumulated. The spectra were processed by applying a 0.5 Hz exponential line broadening (the half-height linewidths are quoted without this additional line broadening).\n\nSpectra of F-3 or 3 in CD$_3$OD/H$_2$O (1:1 ratio) presented in Figure 7 were acquired using the SHARP pulse sequence of Figure 1, relaxation delay of 3 s, acquisition time of 0.89 s, two dummy scans and two scans, a 125 µs 90° rectangular excitation pulse and 250 µs rectangular 180° pulses during the acquisition. The length of 180° rectangular pulses was set to avoid perturbation of the F-1 and F-4 spins. The acquisition chunk lengths varied between 0.845 and 3.38 ms. The spectra were processed using exponential line broadening of 0.5 Hz (the half-height linewidths are quoted without this additional line broadening). The 1D $^{19}$F spectra were acquired using a 90° excitation pulse and parameters used for the SHARP spectra.\n\nKOH catalyzed protodeboronation of 2/2a in 1:1 H$_2$O/dioxane mixture was monitored by the acquisition of $^{19}$F NMR sel-SHARP spectra (pulse sequence of Figure 3, $n =$128) in a stop-flow experiment (Figure 8). Two scans were acquired per spectrum using a relaxation delay of 1.5 s and the overall acquisition time of 4.99 s per scan, which consisted of 2.18 s of sampling (acquisition chunk time of 8.5 ms) and 2.81 s (10 ms Gaussian pulses, 300 us PFGs and 200 us gradient recovery delays). Two dummy scans were applied before the acquisition of the first spectrum only. Sixteen spectra were acquired with the first and the last starting and 208 s, respectively, after the mixing was triggered.\n\nSpectra of 5/5a in 1:1 H$_2$O/dioxane mixture presented in Figure 9 were acquired using the sel-SHARP pulse sequence of Figure 3, relaxation delay of 3 s, acquisition time of 1.5 s, two dummy scans and four scans, a 93 µs 90° rectangular excitation pulse, 1 ms 180° Gaussian pulse during the SPFGSE and 186 µs rectangular 180° pulses during the acquisition. The length of 180° rectangular pulses was set to avoid perturbation of the other fluorine spins. The chunk lengths was set to 23.4 ms. The 1D $^{19}$F spectra were acquired using relaxation delay of 3 s, acquisition time of 0.87 s, 2 dummy scans and 8 scans. Samples were prepared by mixing 500 µl of 0.1 M 5 containing 0.01 M trifluoroacetic acid with increasing amounts of 0.1 M 5 in 0.1 M KOH. In this way the concentration of 5 was kept constant. The resulting concentrations of KOH, together with obtained linewidths and chemical shifts, are reported in (Supporting Information, Table S4).\n\nLine Shape Analysis. As indicated, the 5/5a exchange (Equation 3) is fast on the chemical shift scales ($k_e >> \\Delta \\omega$, where $\\Delta \\omega = \\omega_1 - \\omega_2$ and $\\omega_1$, $\\omega_2$ are the resonance frequencies of spins in sites A and B in the absence of chemical exchange) and also on the relaxation time scale ($\\Delta \\omega >> \\Delta \\tau$ and $k_e >> \\Delta \\tau$, where $\\Delta \\tau = \\Delta \\tau_{AB} - \\Delta \\tau_{AA}$ and $\\Delta \\tau_{AB}$ are the relaxation rate constants for sites in sites A and B in the absence of chemical exchange and $k_e = k_a + k_b$). Under these circumstances, the relative site populations, $p_A$ and $p_B$ ($p_A + p_B = 1$) satisfy the balance relationship $p_Ak_A = p_Bk_B$. If $p_A >> p_B$ (or $p_B >> p_A$), the transverse relaxation rate constant $R_2$ of the population–averaged resonance line is given by Equation (1) where $R_2^2 = R_2^2A + R_2^2B$. The position of the observed spectral line is given by Equation (2)\n\n$$R_2 = R_2^2A + p_AR_2^2A\\Delta \\omega_0^2/k_{ex}$$\n\n$$\\Omega = p_AR_2B + p_BR_2B$$\n\n(1)\n\n(2)\n\nBased on the measured values of $\\Omega_2$, $\\Delta \\omega_0$, $\\Omega_3$, $R_2A$, and $R_2B$ values of $p_A$ and $k_{ex}$ were calculated using Equations (1) and (2).\n\nRESULTS AND DISCUSSION\n\nAlternative Pure-Shift Arrangements. In a pure-shift method designed for reaction monitoring, the r.f. carrier is placed on the chemical shift of a selected nucleus. This arrangement ultimately produces an exponential free induction decay (FID) with zero chemical shift modulation. Under these circumstances, 180° pulses can be repeatedly applied to the active spin. The effective $\\theta/180^\\circ$ rotation of the detected/coupled protons, which is at the heart of broadband decoupling of selected signals during indirect$^{19}$F or direct$^{19}$F acquisition periods, can thus be replaced with a $180^\\circ/\\alpha^\\circ$ element, maintaining all the attributes of a pure shift methodology while realizing additional benefits.\nIn its basic form, the outlined pure-shift real-time experiment removes all heteronuclear couplings of an isolated nucleus, e.g. a $^{19}$F in a fluorinated organic molecule – a motif common in contemporary medicinal chemistry. The experiment", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " spines (figs. 10, 11, 12, q). Besides double tentacle hooks, there are others that are simple, and, from the grain on which they are mounted as a base, may be termed grain hooks. Those that first appear are simple spicules, bent or straight, standing on the side arm plates, above the tentacle hooks (figs. 8, 9). Then a granule is formed under them (fig. 13). More of such hooks grow on the grains or little swollen plates which occupy the position of upper arm plates among Ophiurans (fig. 10). Later there remain on the side arm plate only the true tentacle hooks, while the grain hooks stand on those double rows of raised grains which give the ringed or burr look to the small branches of Astrophytons (Pl. XXXV. fig. 19). As they approach the disk and thicker part of the arm these raised rows sink and their hooks disappear, and a coarse granulation overgrows the first layer of swelled plates, so that the surface of the arm becomes even. The side arm plates which began as ridges encircling the whole arm change their character rapidly. In the central depression between them, on the upper side of arm, a little upper arm plate begins to form (Pl. XXXVI. fig. 5), like a perforated lime crust. Then, as the arm enlarges, the side plates separate above, and between them are formed additional scales, which occupy the position of upper arm plates, but follow no rule in their growth (fig. 7). They do not even multiply by the irregular method of *Hemieuryale pustulata.* These scales, at first thin (figs. 7, 15), afterwards thicken and become more rounded (figs. 10, 11), and some of them make the basis of the two annular rings of grains carrying the grain hooks, which afterwards drop off, so that at the base of an arm there appear (in a dry specimen) only the thickened skin, with a granular coat and a few irregular plates above the side arm plates. These last, early separated above (figs. 7, 13), maintain their union underneath (figs. 6, 12, 16, 17, 19, i). It follows that the growing arm rises more and more above them. They retain their simple form almost throughout, but, within the disk, in fully grown specimens they are broken in two (fig. 19, i). The under arm plates first appear about two forks from the tip of the arm; not, however, simple, but divided in three parts (fig. 12, h), which may still be seen inside the disk of young specimens (fig. 17, h, h). In adults these plates, at the third fork of the arm, are in four triangular pieces, making together an oblong figure. Within the disk the number of pieces is considerable and their form irregular (fig. 19). In this respect there is a marked difference from Ophiurans, whose upper arm plates may be composed of several pieces developed under certain rules, but whose side and under plates are almost always simple, rarely of two pieces, and in one species only (*Ophiomyxa pentagona*) of three pieces.\n\n2 Lütken's figures indicate that the young of *Gorgonocephalus cucematus* has the under arm plate not divided (Addit. ad Hist. Oph., vol. i., pl. ii. figs. 17b and 17d).\nThe skeleton of a *Gorgonocephalus* does not differ more from that of an ordinary Ophiuran than those of Ophiurans differ among themselves. All the mouth parts are present (figs. 18, 19); mouth frames (*f*), jaws (*c*), jaw plate (*e*), sockets for two sets of tentacles (*r, r'*), and a large peristomial plate (*v*) in two pieces. There is, in addition, a small angle cover (*v'*), which is strongly developed in most Astrophytous, and which Ludwig considers the first under arm plate. The radial shield, genital plate (*o*), and genital scale (fig. 17, *n*) occupy normal positions. In regard to the radial shields, this peculiarity is to be remarked, that they are made up of a series of plates soldered one on the other like tiles. This structure calls attention to the fact that radial shields, which, from their almost constant presence, and their articulation with the genital plate, are usually considered exceptional parts, are truly nothing more than a disk scale, or a series of soldered disk scales. Hinged to the genital plates they regulate the position of the roof of the disk as it is raised or lowered. Moreover, the genital plates themselves, with their genital scales, are nothing more than highly specialised scales of the lower interbrachial space, folded in, and bounding the genital openings on either side. In some genera (*e.g.*, *Ophiomusium*) the genital plate is externally conspicuous as one of the chief pieces of the lower interbrachial space. The arm bones do not essentially differ from those of Ophiurans, except that their joints are simplified so as to be adapted to rolling in a vertical plane. The outer face has the usual transverse hour-glass projection, which is vertical on the inner face.\n\nPassing now to *Euryale*, striking variations present themselves. The proportions and arrangement of the mouth differ much from those of *Gorgonocephalus*. Two large, flattened jaws (Pl. XXXV. fig. 1, *c*) support a small jaw plate (*e*), which carries, not the usual bunch of spines, but a vertical row of flat teeth (*d'*) like those of Ophiurans, or those of *Astroschema*. Seen from above, the jaws (*e*) and mouth frames (*f*) are much more solid than in *Gorgonocephalus*, and the peristomial plate (*v*), instead of being flat and divided, is much swollen and single. While *Gorgonocephalus* has the under arm plates in three pieces at the tip of the arm, and existing at its base only as irregular, broken scales, *Euryale* has them nearly or quite unbroken (figs. 1, 6, *h*) and of a regular form for the whole length of the arm except the terminal twigs. It is at the end of the arm that there is a remarkable difference in the side plates of the two genera. *Gorgonocephalus* has small thick plates clinging close to the arm, while *Euryale* is furnished with long, finger-like projections standing free and bearing prehensile hooks (figs. 8–12).\n\nA side arm plate of the same general character may be found at the tip of the arm of *Ophiiothrix pusilla*. Passing towards the disk, these plates grow shorter and wider, and their hooks thicken into club spines (figs. 8, 9, *i, j*). Still further inward the side plates are nearly like those of Ophiurans, and carry little conical tentacle scales (or arm spines) on\n\n---\n\nThe exterior double rows of hook-bearing grains, found in *Astrophyton, Gorgonocephalus, Astroclon, Astrocnida, Astroporpa, Astrogomphus, Astrochele, and Astrotoma* do not exist at all in this genus, which agrees in this respect with *Trichaster, Astroceras, Astroschema, Ophiocreas*, and *Astronyx*. The chief bracing pieces, namely, radial shield and genital plate, are stout and firmly hinged, and the former (fig. 3, 1), instead of being composed of united overlapping scales, is solid; while the latter (α) is firmly bedded in a series of soldered plates, which connect it with the side arm plates (i). Attached to the articulation is a short, very stout, genital scale (α). The arm bones are lower and wider than among kindred genera, but are jointed in the usual way; that is to say, the inner face presents a vertical prominence constricted in the middle (fig. 14, β), while the outer face has a similar but horizontal prominence (fig. 13, γ), and the two, held together by muscles and skin, make a free-playing joint. At each forking of the arm a curious modification takes place. The bone, while retaining its general form, is much widened and is split vertically almost in two (fig. 16); on the inner face of each half is a vertical hour-glass prominence (β), and the outer face of the arm bone next within is suitably modified (fig. 15) by being much widened, and by having, at its constricted part, an articulating peg, or wedge, which fits into the hollow between the two vertical hour-glasses just described. At the joint outside these, the forking is perfect, and each prong has an arm bone of nearly the normal shape.\n\n**Table of Species of *Astrophyton*.**\n\n
\n\n
\n
Description
\n
Species
\n
\n\n\n
\n
Disk with very high radial shields bearing a few stout stumps, covered
\n
Astrophyton costatum.", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " intrinsic pedal muscles in this animal are well represented. The dorsal layer is very deficient.\n\n_Plantar layer._—In this group there are three muscles, viz. :-\n\n1. Adductor hallucis. \n2. Adductor indicis. \n3. Adductor minimi digiti.\n\nThey all arise by a common origin from the middle of the plantar surface of the tarsus, and, separating, they radiate from each other to reach their insertions. The adductor hallucis is inserted into the extensor tendon upon the outer side of the base of the hallux; the adductor indicis into the extensor tendon upon the same aspect of the base of the index; and the adductor minimi digiti into the extensor tendon upon the inner aspect of the base of the first phalanx of the minimus.\n\n_Intermediate layer._—As in the Beaver, the index, medius, and annularis have each a two-headed flexor brevis. This muscle springs from the base of the corresponding metatarsal, and its two heads, embracing the root of the toe with which it is connected, are inserted partly into the sesamoid and partly into the extensor tendon.\n\nThe flexor brevis minimi digiti has only a fibular head. This is a stout, fleshy belly which springs from the under surface of the external cuneiform bone, and is inserted into the outer sesamoid of the minimus.\n\nThe flexor brevis hallucis is represented by a tibial head which is much smaller than the preceding muscle. It arises from the under surface of the scaphoid, and is inserted upon the inner side of the first phalanx of the hallux.\n\n_Dorsal layer._—This layer is poorly developed. It has the following components :—\n\n1. The abductor hallucis. \n2. The second and fourth dorsal interossei. \n3. The abductor ossis metatarsi minimi digiti.\nThe abductor hallucis is exceedingly small and closely applied to the tibial head of the flexor brevis hallucis. In great part fibrous, it arises from the scaphoid, and is inserted upon the inner side of the nodular first phalanx of the hallux.\n\nThe second and fourth dorsal interossei are strong, single-headed muscles which act as abductors of the index and annularis from the middle toe. There is no trace to be found of the other two interosseous muscles.\n\nThe abductor ossis metatarsi minimi digiti hardly deserves the name of a muscle. It is merely a stout fibrous band with an admixture of fleshy fibres which presents the attachments of this muscle.\n\nNervous arrangements.—The intrinsic muscles are supplied in the usual manner—the abductor and flexor brevis hallucis by the internal plantar nerve; the others by the external plantar. It is to be noted that the deep division of the latter nerve crosses the foot subjacent to the plantar muscles, and that it gives off the digital branch for the adjacent sides of the annularis and minimus. This branch reaches its destination by emerging from under cover of the adductor minimi digitii.\n\nA comparison of the feet of the foregoing members of the Rodent order shows what seems to be a tendency to the disappearance of the plantar and dorsal muscles, but a retention of the intermediate muscles. The following table renders this evident:\n\n### Plantar layer.\n\n
\n\n
\n
Animal
\n
Adductors
\n
\n\n\n
\n
Paca
\n
Three strongly developed adductors.
\n
\n
\n
Hare
\n
Two feeble adductors.
\n
\n
\n
Beaver
\n
One very weak adductor (with traces of a second).
\n
\n
\n
Bathyergus
\n
None.
\n
\n
\n
Cape Mouse
\n
\n
\n\n
\n\n### Dorsal layer.\n\n
\n\n
\n
Animal
\n
Members of this group
\n
\n\n\n
\n
Paca
\n
Four members of this group (two very weak).
\n
\n
\n
Beaver
\n
Four members of this group (one very weak).
\n
\n
\n
Hare
\n
None.
\n
\n
\n
Bathyergus
\n
\n
\n
\n
Cape Mouse
\n
\n
\n\n
\n\n### Intermediate layer.\n\n
\n\n
\n
Animal
\n
Members of this group
\n
\n\n\n
\n
Bathyergus
\n
Five members of this group.
\n
\n
\n
Paca
\n
\n
\n
\n
Hare
\n
Four members of this group.
\n
\n
\n
Beaver
\n
Three members of this group (with traces of two others).
\n
\n
\n
\n
\n
\n\n
\n\nFurther, according to St. George Mivart and Murie,¹ we may class with the Bathy-\n\nergus and Cape Mouse the Crested Agouti and the Guinea Pig, in both of which flexores breves are alone developed.\n\nCheiroptera.\n\nPteropus (Fox-bat), (Pl. XI. figs. 1 and 2).\n\nThe foot of the Fox-bat is pentadactylous—the four outer toes being of nearly equal length, and the hallux slightly smaller. All the digits are armed with sharp curved claws. The intrinsic muscles are well marked, but the dorsal or abducting members of the group, with one exception, are absent. They are all placed upon the plantar aspect of the metatarsus, and are all but invisible from the dorsal aspect of the foot.\n\nPlantar layer.—Only two muscles of this layer are represented, viz.:\n\n1. Adductor hallucis (p¹).\n2. Adductor minimi digiti (p²).\n\nThese muscles together form a thin triangular sheet of muscular fibres spread out upon the flexores breves, but separated from them by the deep division of the external plantar nerve (d.d). This muscular sheet arises by its apex from the plantar surface of the tarsus somewhat nearer the inner than the outer margin of the foot, and it is mapped out into the two adducting muscles by a distinct fibrous raphe which extends from the apex to the base. The distal end of the raphe is not attached, and ends close to the inner side of the root of the medius. The adductor minimi digiti is much the larger of the two muscles, and is inserted into the inner sesamoid at the base of the first phalanx of the minimus. The adductor hallucis, small in proportion to the preceding, is inserted into the outer sesamoid at the base of the first phalanx of the hallux.\n\nIntermediate layer.—This layer is typically complete (f¹ to f⁵). A flexor brevis is provided for each digit; each muscle consists of two heads, and these are separate throughout their entire length. This group therefore is composed of eight distinct muscular slips, all of which lie upon the same plane. They arise from the fibrous textures at the base of the metatarsus and are inserted into the sesamoid bones alone.\n\nThe outer head of the flexor brevis minimi digiti, and the inner head of the flexor brevis hallucis, are considerably larger than the others. This increase in bulk may be due to their having coalesced with the absent abductor minimi digiti, and abductor hallucis.\n\nDorsal layer.—The only member of this layer which is present is the abductor ossis metatarsi minimi digiti (d⁵). It is well developed, and has the usual connections. Not a trace of the dorsal interossei is to be found.\n\nNervous arrangements.—The posterior tibial nerve divides into its two terminal branches in the hollow of the os calcis.\nThe internal plantar nerve (i.p.n) on entering the sole at once breaks up into four\ndigital branches:—These are distributed as follows:—(1) the innermost goes to the inner\nside of the hallux and gives three minute twigs to the large inner head of the flexor brevis\nhallucis; (2) the next divides to supply the adjoining margins of the hallux and index,\nand gives a muscular twig to the first lumbral; (3) the third bifurcates and supplies\nthe adjacent borders of the index and medius, and furnishes a filament to the second\nlumbral; (4) the fourth in like manner supplies the contiguous sides of the medius and\nannularis, and gives a twig to the third lumbral. From the trunk of the internal\nplantar, before it breaks up into its digital branches, a few filaments are furnished to\nthe flexor brevis digitorum.\n\nThe external plantar nerve (e.p.n) turns outwards under cover of the flexor brevis\ndigitorum, and after supplying the abductor ossis metatarsi minimi digiti with one or\ntwo twigs divides into its superficial and deep divisions. The superficial part ends in\ntwo digital branches, of", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " upland movement habitat and 6,783 acres of overwintering habitat.\n\nActivities under the conservation strategy that require ground or vegetation disturbance could result in adverse effects on this species. In addition to management activities under the conservation strategy, the Neighboring Land Owner Program provides take coverage for giant garter snake on private lands adjacent to reserve system lands as discussed above and in Section 2.3.2, Alternative B—Proposed Action Alternative (Permit Issuance/Plan Implementation).\n\nProjects and activities under the Proposed Action Alternative, including conservation strategy activities that have the potential to result in giant garter snake habitat loss and/or mortality, would be required to implement general project and construction AMMs as discussed above to reduce these effects to the greatest extent practicable. In addition to these general project and construction AMMs, covered activities would be required to implement an AMM specific to the avoidance and minimization of take of giant garter snake. This species specific AMM is shown in Table 2-7 and detailed in Appendix C. This AMM requires avoidance of development in or within 200 feet of aquatic habitat, and if habitat cannot be avoided survey using the USFWS protocol (USFWS 1997), as well as additional measures to encourage giant garter snakes to leave the site on their own accord, and measures to avoid injury or mortality if giant garter snakes are encountered during construction.\n\nThe conservation strategy includes a monitoring and adaptive management component as well as the incorporation of 2,910 acres of giant garter snake habitat on pre-permit reserve lands, and specific biological objectives for the conservation of giant garter snake including; protecting 2,800 acres of rice fields, 1,160 acres of upland habitat, 500 acres of emergent wetland, and 420 acres of lacustrine and riverine suitable habitat for giant garter snake. The conservation strategy also prioritizes the incorporation of lands into the reserve system that are adjacent to existing conservation lands will further limit the effects on the species from habitat fragmentation [See Section 2.3.2, Alternative B—Proposed Action Alternative (Permit Issuance/Plan Implementation)].\n\nAs the result of the conservation strategy, a total of 10,290 acres of giant garter snake would be protected, monitored and adaptively managed. In addition, the connectivity of habitat, as well as monitoring and adaptive management under the conservation strategy would provide additional value beyond the project by project mitigation that would occur under the No Action Alternative.\n\nConservation activities under the Proposed Action Alternative are similar to those that would be required by the permitting process under the No Action Alternative. The conservation strategy is also expected to result in additional benefits to the species above what would likely be required under the No Action Alternative. This would result, in part, through the inclusion of habitat in a reserve system that incorporates and is\nconnected to baseline public and easement lands and is subject to monitoring and adaptive management, which would not be required under the No Action Alternative which does not include one cohesive conservation strategy. In addition, all covered activities would be subject to general and species specific AMMs that would further reduce adverse effects on giant garter snake. However, take granted through the neighboring landowner protection program could reduce the beneficial effects of the conservation strategy.\n\n**NEPA Level of Significance:** As compared to the No Action Alternative, this impact is **beneficial**.\n\n**CEQA Level of Significance:** As compared to Existing Conditions, this impact is **less than significant** as implementation of the conservation strategy results in the minimization of effects on this species and compensation for effects that cannot be fully avoided.\n\n*No mitigation is required.*\n\n**Effect Bio-6: Swainson’s hawk.**\n\nSwainson’s hawk is proposed for coverage under the Yolo HCP/NCCP and is listed as a Bird of Conservation Concern by the USFWS and as threatened under CESA. Swainson’s hawk is a seasonal resident of the Plan Area and is generally present from early March, to occupy previous nesting territories or establish new territories, until October, when young have fledged and fall migration is complete. Nesting habitat is predominately within natural riparian woodlands, though trees may be used in other natural and developed habitat types. Foraging habitat consists of natural grassland and agricultural land types that provide similar low open vegetation and high rodent densities (e.g., alfalfa, dry grain and row crops). A complete description of modeled Swainson’s hawk habitat, a detailed species account, and a list of occurrences in the Plan Area can be found in Appendix D. There are 15,673 acres of nesting habitat, 534 nesting sites, 79,336 acres of natural foraging habitat, and 214,078 acres of cultivated lands foraging habitat in the Plan Area.\n\nActivities under the conservation strategy that require ground or vegetation disturbance could result in adverse effects on this species. Projects and activities under the Proposed Action Alternative, including conservation strategy activities that have the potential to result in Swainson’s hawk habitat loss and/or mortality, would be required to implement general project and construction AMMs (as discussed above in the analysis of the Proposed Action Alternative), to reduce these effects to the greatest extent practicable. In addition to these general project and construction AMMs, covered activities would be required to implement an AMM specific to the avoidance and minimization of take on Swainson’s hawk and white-tailed kite. This species specific AMM is detailed in Appendix C and requires avoidance of nest trees, or implementation of surveys for active nests as outlined by Swainson’s Hawk Technical Advisory Committee (2000) and buffers around active nests. This AMM does allow for the removal of up to 20 nest trees (documented nesting within last 5 years) over the permit term, but not while occupied during the nesting season.\n\nThe conservation strategy includes a monitoring and adaptive management component as well as the incorporation of 4,795 acres of Swainson’s hawk habitat on pre-permit reserve lands, and biological objectives for the conservation of Swainson’s hawk including; maintaining crop types that support Swainson’s hawk habitat within the 14,362 acres of protected agricultural lands, provide 4,430 acres of natural foraging habitat, protect and maintain at least 40 protected nest trees, and maintain a density of one suitable nest tree per 10 acres of agricultural lands in the reserve system. The conservation strategy also prioritizes the incorporation of lands into the reserve system that are adjacent to existing conservation lands, which would further limit the effects on the species from habitat fragmentation [See Section 2.3.2, Alternative B—Proposed Action Alternative (Permit Issuance/Plan Implementation)]. As the result of the conservation strategy, at total of 26,031 acres of Swainson’s hawk habitat would be protected, monitored and adaptively managed.\n\nConservation activities under the Proposed Action Alternative are similar to those that would be required by the permitting process under the No Action Alternative. The conservation strategy is also expected to result in additional benefits to the species above what would likely be required under the No Action Alternative. This would result, in part, through the inclusion of habitat in a reserve system that incorporates and is connected to baseline public and easement lands and is subject to monitoring and adaptive management,\nwhich would not be required under the No Action Alternative which does not include one cohesive conservation strategy. In addition, all covered activities would be subject to general and species specific AMMs that would further reduce adverse effects on Swainson’s hawk.\n\n**NEPA Level of Significance:** As compared to the No Action Alternative, this impact is **beneficial**.\n\n**CEQA Level of Significance:** As compared to Existing Conditions, this impact is **less than significant** as implementation of the conservation strategy results in the minimization of effects on this species and compensation for effects that cannot be fully avoided.\n\n*No mitigation is required.*\n\n**Effect Bio-7: White-tailed kite.**\n\nWhite-tailed kite is proposed for coverage under the Yolo HCP/NCCP and is a California fully protected species and protected under the MBTA. White-tailed kite is a year-round resident of the Plan Area that has similar nesting habitat to that described for Swainson’s hawk though the species exhibits less of a preference for a specific vegetation type. Foraging habitat is also similar to that of Swainson’s hawk, though defined for the purpose of this analysis as more frequently used primary and less frequently used secondary foraging habitat. A complete description of modeled white-tailed kite habitat, a detailed species account, and a list of occurrences in the Plan Area can be found in Appendix D. There are 31,732 acres of nesting habitat, 531 nesting sites, 101,758 acres of primary foraging habitat, and 134,740 acres of secondary foraging habitat in the Plan Area.\n\nActivities under the conservation strategy that require ground or vegetation disturbance could result in adverse effects on this species. Projects and activities under the Proposed Action Alternative, including conservation strategy activities that have the potential to result in white-tailed kite habitat loss and/or mortality would be required to implement general project and construction AMMs and the same species specific AMMs as discussed above for Swainson’s hawk.\n\nThe conservation strategy includes a monitoring and adaptive management component as well as the incorporation of 3,545 acres of white-tailed kite habitat on pre-permit reserve lands. There are no specific biological objectives for the conservation of white-tailed kite, though the natural community objectives related to its habitat provide conservation for the species. The conservation strategy also prioritizes the incorporation of lands into the reserve system that are adjacent to existing conservation lands will further limit the effects on the species from habitat fragmentation", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": "/[T, T] \\cong C_2 \\times C_4$ by the above description of $T/E$ (where $E \\leq [T, T]$), $\\text{Aut}(T)$ and hence $\\text{Out}_\\text{typ}(L)$ are 2-groups. So each automorphism of the amalgam $H > T < N$ determines a larger amalgam. Since the only extension of this amalgam is to that of $^2F_4(2)$ by [Fn, Theorem 1], $|\\text{Out}_\\text{typ}(L)| = 2$. □\n5. The cross characteristic case: I\n\nThroughout this section, we will work with groups \\( G = C_G(\\sigma) \\) which satisfy the conditions in Hypotheses 5.1 below. In particular, 5.1(1) implies that \\( G \\) is not a Suzuki or Ree group. We will see in Section 6 (Proposition 6.8) that while these hypotheses are far from including all finite Chevalley and Steinberg groups, their fusion systems at the prime \\( p \\) do include almost all of those we need to consider.\n\nFor any finite abelian group \\( B \\), we denote its “scalar automorphisms” by\n\\[\n\\psi^B_k \\in \\text{Aut}(B), \\quad \\psi^B_k(g) = g^k \\quad \\text{for all } k \\text{ such that } (k, |B|) = 1\n\\]\nand define the group of its scalar automorphisms\n\\[\n\\text{Aut}_{sc}(B) = \\{ \\psi^B_k \\mid (k, |B|) = 1 \\} \\leq Z(\\text{Aut}(B)).\n\\]\n\n**Hypotheses 5.1.** Assume we are in the situation of Notation 2.2(A,B,C).\n\n(I) Let \\( p \\) be a prime distinct from \\( q_0 \\) such that \\( p | W_0 | \\). Assume also that \\( \\sigma = \\psi_q \\circ \\gamma = \\gamma \\circ \\psi_q \\in \\text{End}(\\overline{G}) \\), where\n\n- \\( q \\) is a power of the prime \\( q_0 \\);\n- \\( \\psi_q \\in K_G \\) is the field automorphism (see Definition 3.1(a)); and\n- \\( \\gamma \\in \\text{Aut}(\\overline{G}) \\) is an algebraic automorphism of finite order which sends \\( \\overline{T} \\) to itself and commutes with \\( \\psi_{q_0} \\) (so that \\( \\psi_{q_0}(G) = G \\)).\n\nAlso, there is a free (\\( \\tau \\))-orbit of the form \\( \\{\\alpha_1, \\alpha_2, \\ldots, \\alpha_s\\} \\) or \\( \\{\\pm \\alpha_1, \\pm \\alpha_2, \\ldots, \\pm \\alpha_s\\} \\) in \\( \\Sigma \\) such that the set \\( \\{\\alpha_1, \\alpha_2, \\ldots, \\alpha_s\\} \\) is linearly independent in \\( V \\).\n\n(II) The algebraic group \\( \\overline{G} \\) is of universal type, and \\( N_G(T) \\) contains a Sylow \\( p \\)-subgroup of \\( G \\).\n\n(III) Set \\( A = O_p(T) \\). Assume one of the following holds: either\n\n(III.1) \\( q \\equiv 1 \\pmod{p} \\), \\( q \\equiv 1 \\pmod{4} \\) if \\( p = 2 \\), \\( |\\gamma| \\leq 2 \\), and \\( \\gamma \\in \\Gamma_{\\overline{G}} \\) (thus \\( \\rho(\\Pi) = \\Pi \\)); or\n\n(III.2) \\( p \\) is odd, \\( q \\equiv -1 \\pmod{p} \\), \\( G \\) is a Chevalley group (i.e., \\( \\gamma \\in \\text{Inn}(\\overline{G}) \\)), and \\( \\gamma(t) = t^{-1} \\) for each \\( t \\in \\overline{T} \\); or\n\n(III.3) \\( p \\) is odd, \\( |\\tau| = \\text{ord}_p(q) \\geq 2 \\), \\( C_A(O_{p'}(W_0)) = 1 \\), \\( C_S(\\Omega_1(A)) = A \\), \\( \\text{Aut}_G(A) = \\text{Aut}_{W_0}(A) \\),\n\n\\[\nN_{\\text{Aut}(A)}(\\text{Aut}_{W_0}(A)) \\leq \\text{Aut}_{sc}(A) \\text{Aut}_{\\text{Aut}(G)}(A)\n\\]\n\nwhere \\( \\text{Aut}_{\\text{Aut}(G)}(A) = \\{ \\delta | A \\mid \\delta \\in \\text{Aut}(G), \\delta(A) = A \\} \\), and\n\n\\[\n\\text{Aut}_{W_0}(A) \\cap \\text{Aut}_{sc}(A) \\leq \\begin{cases} \n\\langle \\gamma | A \\rangle & \\text{if } 2 | \\text{ord}_p(q) \\text{ or } -\\text{Id} \\notin W \\\\\n\\langle \\gamma | A, \\psi_{\\overline{A}} \\rangle & \\text{otherwise},\n\\end{cases}\n\\]\n\nSince \\( W_0 \\) acts on \\( T \\) by Lemma 2.3, it also acts on \\( A = O_p(T) \\).\n\nWe will see in Lemma 5.3 that the conditions \\( C_S(\\Omega_1(A)) = A \\) (or \\( C_S(A) = A \\) when \\( p = 2 \\)) and \\( \\text{Aut}_G(A) = \\text{Aut}_{W_0}(A) \\), both assumed here in (III.3), also hold in cases (III.1) and (III.2).\n\nRecall, in the situation of (III.3), that \\( |\\tau| = |\\gamma|_{\\overline{\\gamma}} \\) by Lemma 3.2.\n\nNote that the above hypotheses eliminate the possibility that \\( G \\) be a Suzuki or Ree group. Since we always assume the Sylow \\( p \\)-subgroups are nonabelian, the only such case which\nneeds to be considered here (when \\( q_0 \\neq p \\)) is that of \\( {}^2F_4(q) \\) when \\( p = 3 \\), and this will be handled separately.\n\nBy Lemma 3.2, whenever \\( \\sigma = \\psi_q \\circ \\gamma \\), and \\( \\gamma \\) is an algebraic automorphism of \\( \\bar{G} \\) which normalizes \\( \\bar{T} \\), there is \\( \\tau \\in \\text{Aut}(V) \\) such that \\( \\tau(\\Sigma) = \\Sigma \\) and \\( \\sigma(\\bar{X}_\\alpha) = \\bar{X}_{\\tau(\\alpha)} \\) for each \\( \\alpha \\in \\Sigma \\). So under Hypotheses 5.1, the condition at the beginning of Notation 2.2(C) holds automatically, and with \\( \\rho = \\tau|_\\Sigma \\). To simplify the notation, throughout this section and the next, we write \\( \\tau = \\rho \\) to denote this induced permutation of \\( \\Sigma \\).\n\nThe following notation will be used throughout this section, in addition to that in Notation 2.2. Note that \\( \\hat{\\Pi} \\) and \\( \\hat{\\Sigma} \\) are defined in Notation 2.2(C) only when \\( \\rho(\\Pi) = \\Pi \\), and hence only in case (III.1) of Hypotheses 5.1. It will be convenient, in some of the proofs in this section, to extend this definition to case (III.2).\n\nRecall (Notation 2.2) that for \\( \\alpha \\in \\Sigma \\), \\( w_\\alpha \\in W \\) denotes the reflection in the hyperplane \\( \\alpha^\\perp \\subseteq V \\).\n\n**Notation 5.2.** Assume we are in the situation of Notation 2.2 and Hypotheses 5.1.\n\n(D) If (III.2) holds, then set \\( \\hat{\\Sigma} = \\Sigma \\), \\( \\hat{\\Pi} = \\Pi \\), and \\( V_0 = V \\). Note that \\( W_0 = W \\) in this case.\n\n(E) If (III.1) holds, then for each \\( \\hat{\\alpha} \\in \\hat{\\Sigma} \\), let \\( w_{\\hat{\\alpha}} \\in W_0 \\) be the element in \\( \\langle w_\\alpha \\mid \\alpha \\in \\hat{\\alpha} \\rangle \\) which acts on \\( V_0 \\) as the reflection across the hyperplane \\( \\langle \\hat{\\alpha} \\rangle^\\perp \\), and which exchanges the positive and negative roots in the set \\( \\langle \\hat{\\alpha} \\", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " supersonic flow and high speed Schlieren photographs were taken. These photographs revealed a highly unstable shock pattern ahead of the canopy. Similar tests of flexible models showed irregular oscillation, structural instability, and eventual destruction of the canopy.\n\nThe analysis of the conventional parachute in supersonic flow, and the subsequent development and testing of a supersonic retardation device proceed in the following phases:\n\n1) Pressure distribution studies on conventional canopy in supersonic flow\n\n2) Water analogy studies in conventional water tow\n\n3) Water analogy studies in water table with stationary models\n\n4) Wind tunnel stability studies of supersonic parachutes\n\n5) Drag studies of supersonic parachutes.\n\nThese phases will be reported in respective order in the following sections of this report.\n5.2 Pressure Distribution Studies in Supersonic Wind Tunnel\n\n5.2.1 As a first step in the analysis of conventional parachutes, the pressure distribution on both the inside and outside surfaces of a conventional ribbon parachute model suspended in the wake of an ogive cylinder forebody was studied. Model geometry, test arrangement, and pressure distribution for Mach numbers of 0.8, 1.2, and 4.5 were presented in Progress Report No 12. Pressure distributions for Mach 3.0 were given in Progress Report No 15.\n\n5.2.2 During this reporting period, tests were made to determine the influence of the ogive-cylinder forebody on the internal and external pressure distributions on the canopy at Mach numbers of 1.08 and 3.0. These tests were made with and without suspension lines, in order to determine their effect on pressure distribution. Previously, the transonic tests were made at Mach 1.2; however, in the wind tunnel now being used, the highest attainable Mach number with the model mounted in the test section was Mach 1.08. Therefore, the transonic studies were continued at this Mach number.\n\n5.2.3 The parachute models and testing procedure were the same as in previous studies. As before, two secondary parachute models were used, one to measure internal and the other to measure external pressures. The suspension lines for these tests were secured at the confluence point by a set of guy wires fastened to the tunnel walls (see Fig 7-1). The pressures were measured on a multiple manometer and photographed during each test. Three tests were conducted for each configuration at both Mach numbers.\n\n5.2.4 Results\n5.2.4.1 The pressure measurements from three internal and three external pressure distribution tests were averaged in each case. These measurements were then reduced to coefficient form with the pressure coefficient, \\( C_p \\), defined as\n\n\\[\nC_p = \\frac{P_L - P_s}{q},\n\\]\n\nwhere\n\n- \\( P_L \\) = local pressure on the surface of the model\n- \\( P_s \\) = free stream static pressure\n- \\( q \\) = free stream dynamic pressure.\n\n5.2.4.2 Figures 7-2 and 7-3 present the pressure coefficient distribution of the parachute model in free stream with and without suspension lines, respectively, at transonic Mach numbers. For comparison, Fig 7-4 presents these two sets of curves together with the pressure distribution of the model with suspension lines behind an ogive-cylinder forebody (previously presented as Fig 7-11, Progress Report No 12). Similarly, Figs 7-5 through 7-7 present the same sequence of pressure coefficient distributions at Mach 3.0. It is seen that the forebody has only a small influence on either the internal or external pressure coefficient at Mach 1.08 and 3.0. The suspension lines do have noticeable influence on the magnitude of the internal pressure coefficient, especially at Mach 3.0. This increase in internal pressure coefficient is due to the large pressure recovery across the well defined shock ahead of the canopy without suspension lines (see Sec 5.2.4.3). The suspension lines do not noticeably influence the external pressure coefficient at either Mach number.\nFigures 7-8 and 7-9 are double exposure shadowgraphs of the flow pattern at Mach 3.0 about a parachute model in free stream with and without suspension lines, respectively. It is seen that apparently the suspension lines cause a highly irregular shock pattern ahead of the canopy. In tests without suspension lines, a stable detached shock wave pattern is formed. However, this contradicts previous experience, and efforts are now being made to explain this contradiction, as outlined in Sec 5.2.5.1 below.\n\nProposed Work\n\nThe pressure distribution studies as specified in the present contract have been completed. However, during the next reporting period, additional wind tunnel tests of several canopies with varying porosities and different methods of mounting will be made to determine the factors which influence the character of the shock wave ahead of the canopy without suspension lines. These tests will be conducted at Mach numbers of 2.0 and 3.0.\n\nDuring the next reporting period, work will begin on the writing of a final report for this phase of the project.\n\nWater Tow Studies\n\nAs a second phase of the investigation, a series of two-dimensional water analogy studies have been made to visualize flow patterns within the canopy. These studies were applied first to the analysis of the instability of conventional parachutes, reported in Progress Report No 12, and later to stability studies of various configurations of the so-called spiked parachute, reported in the Supplement to Progress Report No 13.\n5.3.2 During this reporting period, a series of tests was performed at Mach 2.0 with the spiked parachute behind an ogive-cylinder forebody with a caliber of 2.5. Tests were run at L/D ratios of 4.5 and 8. The ratio of the parachute model maximum diameter to the forebody diameter was 2.\n\n5.3.3 Results\n\nFigures 7-10 and 7-11 show the flow pattern about the spiked parachute behind the forebody (see Progress Report No 15, Fig 7-5, for identification of parameters). For comparison, Fig 7-12 shows the flow pattern about the model in free stream at Mach 2.0. It is seen that the flow patterns are somewhat less defined for the parachute in the wake of the forebody but similar in nature. The stability seems to be unaffected.\n\n5.3.4 Proposed Work\n\nWater analogy experiments will be continued in close coordination with supersonic wind tunnel tests of the spiked parachute. Making use of existing property analogies (derived in Progress Report No 1), attempts will be made to determine pressure distribution and relative drag of retardation devices in the water tow tank.\n\n5.4 Stationary Model Water Analogy Studies\n\n5.4.1 The advantages of complementing the conventional water tow experiments with studies in a moving water channel were enumerated in Progress Report No 15. Desirable features for the projected facility were indicated and the detail design was begun.\n\n5.4.2 During this reporting period, the design of the main component\nparts of the new water channel, including the structural framework and the water ducting and reservoir, was completed. Bids for the construction of these parts were received from local machine shops, but acceptance of a bid was delayed because of the termination of the present contract. Upon authorization in the new contract, a bid will be accepted.\n\n5.4.3 A Description of the New Water Channel\n\n5.4.3.1 Figure 7-13 is a general assembly drawing of the proposed facility, and shows the main features and dimensions. The main components will be described in the following paragraphs of this report.\n\n5.4.3.2 Main Channel and Supporting Structure\n\nThe rectangular channel is approximately 20 ft long, 52 inches wide, and 5 inches deep. The channel floor consists of one piece of high grade, mirror finish plate glass 15 ft long and 3/4 inch thick. The glass rests on plexiglass support pads mounted on adjustable swivel screws used for fine adjustment in levelling the surface of the glass.\n\nThe vertical side walls of the channel are made of 6 x 3 1/2 x 3/8 inch right angle structural steel attached to the top chord of the supporting structure. The channel is supported by two parallel steel trusses 2 ft deep; its top chords consist of 4 x 2 1/4 inch steel channel sections running the entire length of the structure. The lower chord is made 4 ft shorter at the downstream end of the channel to provide space for the pump and motor drive. At 2 1/2 ft intervals, there are cross ties joining the two top and the two bottom chords. The swivel screws and plastic pads\nwhich support the glass floor of the channel are screwed at intervals into the ties between the top chords. Ties at the lower panel joints support the water supply pipe and ducting. Horizontal diagonal bracing members were avoided in order to have large, unobstructed panels directly beneath the glass floor for photographic purposes.\n\n5.4.3.3 Channel Tilting Mechanism\n\nA uniform slope of the channel is necessary to secure uniform flow velocity. This slope must be adjustable in order to attain the water flow velocity representing a certain Mach number. Variation of the longitudinal slope of the channel is provided by means of the tilting mechanism illustrated in Fig 7-13. At the downstream end of the lower chord, the trusses are mounted on hinge pins. Near the upstream end of the channel, a 1 inch diameter bar is welded transversely to the bottom of the upper chord members. This bar will be carried by two hydraulic rams, one on each side. The hydraulic rams are connected to a hand operated hydraulic pump by means of flexible pressure tubing and shut-off valves. The hydraulic rams have", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": "\n\nDivision of Cancer Science and Molecular Pathology, Glasgow University, Western Infirmary (Pathology), Dumbarton Road, Glasgow G11 6NT, U.K.\n\nAbstract\n\nMammalian erythrocytes are generally thought to lack RNA and therefore to be unable to translate new proteins in response to internal or external signals. Support for this long-standing view has accumulated from diverse studies, most of which have focused on the total content of RNA or the overall level of translation. However, more recent work on specific types of RNA has shown the presence in human erythrocytes of both Y RNA and microRNA. The latter seem particularly incongruous given that their normal role is to attenuate the translation of mRNA. Y RNA binds the Ro autoantigen which may have a role in cellular RNA quality control. Therefore the presence of both of these non-coding RNAs indicates the possible existence of other cryptic RNAs in erythrocytes. It also suggests either the existence of low levels of translation or new uncharacterized processes involving microRNA in these cells.\n\nErythrocyte biology\n\nVast numbers (~2–3×10¹³) of erythrocytes circulate in the peripheral blood of an adult human and are essential for efficient gas exchange and transport throughout the body. Erythrocytes have evolved a highly specialized physiology, shape and structure for this crucial role: in the course of their development, mammalian erythroid cells eliminate most of the major structures normally present in eukaryotic cells, including nuclei, mitochondria, Golgi and endoplasmic reticulum. These changes are a vital part of a developmental programme that improves efficiency of gas exchange, increases the flexibility of the erythrocyte allowing easier passage through narrow vessels and reduces the effort required of the heart to pump the cells around the body [1]. However, the losses, particularly of the nucleus, also prevent erythrocytes from responding to internal and external cues by altering gene transcription and mRNA abundance. Once the nucleus is lost at the orthochromatic erythroblast–reticulocyte transition, no more RNA is synthesized, and any further regulation of gene expression is necessarily post-transcriptional.\n\nIn humans, reticulocytes are shed from bone marrow into the bloodstream and then over the next 1–2 days they mature to erythrocytes, during which time haemoglobin content increases, but both translational capacity and RNA content declines. Mature erythrocytes can be easily distinguished from their immediate reticulocyte progenitors by supravital staining with reagents such as New Methylene Blue. Reticulocytes exhibit pronounced staining of the eponymous reticulin which is thought to be a lattice of translating ribosomes in the final throes of haemoglobin production. Mature erythrocytes do not bind the dyes, hence a lack of detectable RNA is a defining feature of the mature erythrocyte. Microphotometry of mature erythrocytes after Azure B staining indicated no RNA present in mature rabbit erythrocytes [2], and measurements of RNA content during in vitro maturation of Friend leukaemia virus-transformed murine reticulocytes to erythrocytes showed the amount apparently asymptotically approaching zero by the end of the maturation period [3]. However, although mature rabbit reticulocytes indeed have diminished numbers of ribosomes compared with immature stages, a significant number were still readily observed by EM (electron microscopy) [4], suggesting that some may be retained in the mature erythrocyte stage that immediately follows. Larger structures such as mitochondria are clearly absent from erythrocytes, but the loss of these during erythropoiesis seems to be mechanistically unrelated to the loss of RNA [5]. For example, inhibitors of autophagy which prevent mitochondrial elimination do not affect the loss of RNA from developing reticulocytes [6]. The cell-wide RNA-destruction programme is probably carried out by ribonucleases such as that described from rabbit reticulocytes, which is active on rRNA, tRNA and probably mRNA [7,8]. However, it is not known how many ribonucleases participate or how selective they are in their substrate choice. Neither is it known whether all RNAs are degraded at equal or different rates or to the same or different extents. The meagre literature on this subject suggests that RNA disposal during erythropoiesis has received little attention, even though adequate destruction of RNA is thought to be important for red cell function (to recycle adenine nucleosides for ATP replenishment [9]).\n\nmiRNA (microRNA) in erythrocytes\n\nGiven the widely held view that erythrocytes have no significant RNA content, it comes as something of a surprise to find that erythrocytes maintain plentiful amounts of miRNA [10,11]. Both studies identified abundant miRNA...\nmiRNAs are the best characterized class of several, novel, small (20–30 nt in length) RNAs that have been discovered within the last few years. Over 1000 different miRNAs are transcribed from the human genome and they exhibit widely varying patterns of expression and degrees of abundance. Their function is to regulate gene expression primarily by inhibiting the translation of mRNA [12,13], but translational promotion has also been reported [14]. Targeting the correct mRNA involves initial complementary Watson–Crick base-pairing between the mRNA and the miRNA. miRNAs accomplish this in partnership with a protein of the Argonaute family in an RNP (ribonucleoprotein) complex known as RISC (RNA-induced silencing complex) [15]. Thus the existence of miRNA in erythrocytes is surprising not only because of their presence, but also because the raison d’être of miRNA in other cells is to regulate gene expression through effects on mRNA translation, and this has long been thought to be absent from erythrocytes.\n\nOther RNAs in erythrocytes\n\nmiRNAs are not, in fact, the first RNAs to have been found in erythrocytes. tRNA was reported to be present in mature erythrocytes [16], but the method by which reticulocytes were excluded as a possible alternative source of the RNA was not detailed. More convincingly, the small RNA polymerase III-transcribed transcripts Y1 and Y4 were shown to be present in mature erythrocytes [17]; density gradient depletion of reticulocytes from peripheral blood did not significantly diminish levels of these RNAs and neither were their levels altered much in blood samples exhibiting reticulocytosis. Therefore the authors concluded that significant amounts of the RNA must be present in mature erythrocytes. The absence of Y3 and Y5 RNA, which are normally present with Y1 and Y4 in nucleated cells, again illustrates how the loss of RNA during erythropoiesis is selective rather than wholesale and is more consistent with there being a reason for the maintenance of certain RNAs within erythrocytes than it being coincidence. Recent studies of Ro RNPs suggest that they function in the maintenance of integrity of other RNAs [18]. Therefore an obvious inference from the presence of Ro RNP in erythrocytes is that other RNAs exist in these cells whose integrity is important. The miRNAs described above are obvious candidates, but small amounts of rRNA and mRNA might benefit from protection and/or surveillance in the pro-oxidative environment of the erythrocyte.\n\nPossible reasons for miRNA in erythrocytes\n\nChen et al. [10] showed that the miRNA pattern in human reticulocytes was very distinct from that in mature erythrocytes. Our own studies suggest the concentration of miRNA in erythrocytes is similar to that in nucleated cells and that the miRNAs are part of an active miRNP (miRNA-containing RNP) with Argonaute proteins (R. Lu and A.J. Hamilton, unpublished work). The selective retention of a distinct set of active miRNAs is more consistent with their having a function in erythrocytes than them being a random remnant of a general RNA-destruction programme. A direct role for the miRNA in the programmed destruction of RNA during erythropoiesis is unlikely because miRNA-directed cleavage of mRNA only occurs if near-perfect complementarity exists between miRNA and a mRNA [15] and very few human miRNAs have this property. Perhaps the most obvious explanation for the presence of miRNA in erythrocytes would be if these cells did, in fact, contain some translating mRNA upon which miRNPs could exert their acknowledged regulatory effects. However, this contradicts the well-established tenet that translation does not occur in these cells. There is good justification for the latter view. In countless routine clinical analyses on patient blood, erythrocytes fail to bind supravital dyes, a compelling testament to the drastic reduction in overall RNA content in these cells. It is also supported by studies of maturing reticulocytes showing a progressive reduction in RNA content to apparently zero levels [2,3,19]. As well as the evident reduction of RNA content, translational activity, as measured by uptake of radioactive amino acids, is close to zero in erythrocytes [20], and studies of reticulocytes show a decline in the ratio of polyribosomes to monosomes [4,21,22] with increasing maturity. However, the presence of miRNA, Y RNA and possibly tRNA show that the erythrocyte RNA content, although low, is not zero. It is possible then that the early studies might also have missed low levels of translation particularly if it were active only under certain conditions. Rikkind et al. [4], reporting an EM study of mat", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-science_math_and_technology-part2", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-science_math_and_technology-part2/part-00-00000.npy", "text": " \\) is complete sufficient for \\( \\theta \\). Consider \\( T = X_{n:n}^2 \\).\n\nObviously, \\( E_\\theta[T] = \\frac{1}{4} \\theta^2 (1 + 1/3n) = r(\\theta) \\). One should verify that \\( E_\\theta[T \\mid X_{n:n}] = \\frac{1}{4} (1 + \\frac{1}{3n})(1 + \\frac{2}{n})X_{n:n}^2 \\). We leave it out as Exercise 7.5.21.\n\nAgain, if one first obtains the conditional pdf of \\( T \\) given \\( X_{n:n} \\) and evaluates \\( E_\\theta[T \\mid X_{n:n}] \\) directly, then one will realize what a clever approach the present one has been. ▲\n\n### 7.6 Unbiased Estimation Under Incompleteness\n\nSuppose that it we start with two statistics \\( T \\) and \\( T' \\), both estimating the same real valued parametric function \\( r(\\theta) \\) unbiasedly. Then, we individually condition \\( T \\) and \\( T' \\) given the sufficient statistic \\( U \\) and come up with the refined Rao-Blackwellized estimators \\( W = E_\\theta[T \\mid U] \\) and \\( W' = E_\\theta[T' \\mid U] \\) respectively.\n\nIt is clear that (i) both \\( W \\) and \\( W' \\) would be unbiased estimators of \\( r(\\theta) \\), (ii) \\( W' \\) will have a smaller variance than that of \\( T \\), and (iii) \\( W' \\) will have a smaller variance than that of \\( T' \\).\n\nAn important question to ask here is this: how will the two variances \\( V_\\theta(W) \\) and \\( V_\\theta(W') \\) stack up against each other?\n\nIf the statistic \\( U \\) happens to be complete, then the Lehmann-Scheffé Theorems will settle this question because \\( W \\) and \\( W' \\) will be identical estimators w.p.1. But if \\( U \\) is not complete, then it may be a different story. We highlight some possibilities by means of examples.\n\n### 7.6.1 Does the Rao-Blackwell Theorem Lead to UMVUE?\n\nSuppose that \\( X_1, \\ldots, X_n \\) are iid \\( N(\\theta, \\theta^2) \\) having the unknown parameter \\( \\theta \\in \\Theta = (0, \\infty), \\chi = (-\\infty, \\infty), n \\geq 2 \\). Of course, \\( \\underline{U} = (\\underline{X}, S^2) \\) is sufficient for \\( \\theta \\) but \\( U \\) is not complete since one can check that \\( E_\\theta[n(n+1)^{-1}\\underline{X}^2 - S^2] = 0 \\) for all \\( \\theta \\in \\Theta \\) and yet \\( n(n+1)^{-1}\\underline{X}^2 - S^2 \\) is not identically zero w.p.1. Now, let us work with \\( T = \\underline{X}, T' = a_n^{-1}S \\) where \\( a_n = \\sqrt{2\\Gamma(\\frac{n}{2})}\\Gamma(\\frac{n+1}{2})/\\sqrt{n-1} \\) and the fact that \\( (2.3.26) \\) it follows that \\( E_\\theta[S] = a_n \\theta \\) and hence \\( T' \\) is unbiased for\n\\( \\theta \\) while obviously so is \\( T \\) itself. Now, \\( \\bar{X}, S^2 \\) are independently distributed and hence we claim the following:\n\n\\[\nE_{\\theta}[\\bar{X} \\mid U] = \\bar{X}, \\quad E_{\\theta}[S \\mid U] = S.\n\\]\n\nThus, the Rao-Blackwellized versions of \\( T \\) and \\( T' \\) are respectively \\( \\bar{X}(= W) \\) and \\( a_n^{-1} S(= W') \\). Clearly \\( W \\) and \\( W' \\) are both unbiased estimators for the unknown parameter \\( \\theta \\). But observe that \\( V_{\\theta}(W) = n \\theta^2 \\) while \\( V_{\\theta}(W') = (a_n^{-2} - 1)\\theta^2 \\). Next, note that \\( \\Gamma(x + 1) = x\\Gamma(x) \\) for \\( x > 0 \\), \\( \\Gamma(\\frac{1}{2}) = \\sqrt{\\pi} \\) and evaluate \\( V_{\\theta}(W') \\). Look at the Table 7.6.1.\n\n
\nQuestions about OAC communications\n\nHow do you receive OAC information?\n\nCame to survey from\nSupporting the OAC\n\nHow should the OAC engage community?\n\nBarriers to volunteering\n\n- Time\n- Awareness\n- Location\n- Not welcoming\n- None\n- Other\nWe are considering a tiered membership system. The base tier would remain at a $5 lifetime fee. The preferred tier would enable members to contribute more to the OAC on an annual basis, in exchange for perks that we would negotiate with the local climbing industry.\n\nWould you donate more money to the OAC, e.g. preferred membership?\nQuestions about what the OAC should be doing\n\nWould you come to a climbing presentation by the OAC?\n\nThere was broad support for an OAC climbing presentation; of course we'll have to actually run one to see how it goes. We have discussed whether it was important to get a “famous” speaker or not, and the split was pretty close to 50/50. Some comments pointed out that it was more important to get a good speaker than a famous speaker, although a famous speaker can help people get in the door. There was a diversity of opinion about the best kind of speaker to get, although 19 responses favoured someone local, 11 responses favoured an access-themed presentation, and 8 responses favoured an accomplished sport climber. We also received 9 responses advocating female speakers. We also have a list of suggestions that we will consider, which includes both local and international climbers (including past and present OAC volunteers).\n\nSelected responses:\n\n- I would go. The speaker needs to somehow help promote the OAC's goals rather than their personal \"accomplishments.\"\n- I would like to learn more about the history of climbing, the mental state of climbing, climbers pushing their limits, breaking barriers, paraclimbing.\n- Someone who has set routes at local crags, trad climbers, world travellers\n- Someone who not only inspires great feats of strength or dedication in climbing, but also in making it sustainable and continually accessible to all for years to come.\n\nDo you engage in protecting climbing environments currently? Do you intend to do so in the future? If so, how?\n\nWe received a variety of responses to this question. Many of the responses (45) mentioned picking up trash at the crag, particularly others' trash, which is a more low-key form of crag cleanups (7). Engaging others came up fairly often (26), sometimes leading by example (4); respondents also mentioned various leave-no-trace practices (24). A couple of responses (6) described supporting groups like the OAC and similar groups with both time and money. Other responses (5) described building and maintaining infrastructure and some responses mentioned responding to calls for letters such as during the Niagara Escarpment Plan consultation.\n\nSelected responses:\n\n- By reducing my personal impact - lunches in plastic containers, packing out human waste/garbage, staying on main trails, avoiding plant life while on the cliffs and approaching, climbing with one partner at a time..\n- Yes, absolutely! By continuing my efforts to always pack out more than you pack in. Clean and be environmentally responsible.\n- I teach outdoor rock climbing. I always emphasize to my students that we are in a shared environment, and so we have to make sure that we make it so that everyone (even people not in our group) can enjoy\nthemselves in it. And I talk about \"no trace\" ethics. I like to help with cleanup days when I'm in town. I'd like to volunteer with the OAC if I can manage it while I travel.\n\nWhat could we be doing better in our relationships with land managers?\n\nMost of the responses advocated for better relationships. The OAC is in constant communication with land managers to maintain its current relationships, and aims to develop new ones when possible. We have particularly good relationships with Conservation Halton, which is a strong supporter of climbing, as well as the Grey Sauble Conservation Authority and the Ontario Ministry of Natural Resources and Forestry. Some responses suggested exercising empathy for the land manager's point of view, which is well taken. We also ought to make an effort to show appreciation for our strong partnerships with land managers on social media.\n\nIn the past year, we have engaged land managers and provided climbing demonstrations at conferences.\n\nA couple of responses suggested events (crag cleanups, trail maintenance). Education, particularly for private landowners, about the Occupiers' Liability Act, is always helpful, and managing climber impact is always key. We have also provided services like helping to fund portapotties at Metcalfe.\n\nSome responses called out specific areas such as Rockwood and Tiffany Falls (which is only open to climbers taking part in organized events).\n\nWe appreciate the responses thanking us for the work we already do!\n\nSelected responses:\n- Develop unique solutions. EG. In Chattanooga, you can actually text a landowner to tell them you're there. They have a tip jar on their crag. It's a strange solution but it could work. Or ask for specific waivers for areas.\n- I admittedly don't know a lot about what is being done, do I can't comment too well on this. With this", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": " available measure of ‘financial muscle’: revenue from day to day football business operations. We only rank the clubs on the money coming in. We do not consider a club’s budget for outgoings or what someone might pay to buy, or invest in, a club.\n\nThe Deloitte Football Money League is the most contemporary and reliable analysis of clubs’ relative financial performance and is released less than nine months after the end of last season, as soon as the relevant clubs’ accounts are available to us.\n\nThe big news this year is that, after eight consecutive seasons at the top of the Money League, Manchester United has been overtaken by Real Madrid. Real have transformed their revenues, doubling them in only four years. What may make other clubs look more closely at Real is the method by which they have delivered much of their revenue growth. The mainstay of Real’s revenue growth is not matchday revenues, as we have seen in many of the UK clubs, or broadcasting revenue, as we have seen – and continue to see – in Italy, but strong progress in realising their commercial potential. Real have concentrated on improving their commercial revenue, both in terms of developing a progressive and extensive partner programme, and in turning the club’s strong international support into revenue for the club. To date both these objectives have been very successful, helping to propel Real’s commercial revenue well above any other Money League club. We profile Real’s commercial revenue, and comment on how they have made it to number one, in one of our feature articles. Whilst not every club has Real’s particular strength of brand and history, we hope there are some insights that others may find comparable to their own situation.\n\nFootball remains a growth sport, especially at the highest level. The continued high level of interest in the sport – both public and commercial – is reflected by another year of strong growth. In our first Money League in 1996/97 the 20 clubs’ combined revenue was €1.2 billion. This year, the total broke the €3 billion barrier for the first time after growing by 6%.\n\nThe catalyst for this remarkable long term growth was the broadcasting rights revolution of the 1990s, fuelled by soaring interest in the game, new technology and deregulation of the broadcast markets. Despite the maturing of broadcast markets, premium content remains critical to the business models of Pay-TV broadcasters. Just look at the collapse of Premiere’s share price after losing the Bundesliga rights, or the recent deals in Italy and France, for clear evidence of this. Recent deals have confirmed our view that the often forecast collapse in broadcast revenues has not materialised and will not happen. In the major European countries the value of top class broadcasting rights continues to rise. We have recently seen a large increase in the value of the German Bundesliga Pay-TV deal, following the huge French deal announced in 2005 which commences next season. And content providers continue to innovate. In Italy, for example, we have seen live rights split into Pay-TV and Digital Terrestrial, with further financial rewards for the clubs.\n\nHowever, many clubs are rightly continuing to concentrate day to day on the areas over which they have direct control. The stadium development boom, started in the early 1990s in the UK, and most recently seen in Germany, has provided the perfect opportunity for clubs to enhance their revenues. We believe further opportunities in\n\n---\n\n**Introduction**\n\nBy Dan Jones, Partner, Sports Business Group at Deloitte.\nWe have used, for each club, the figure for total revenue extracted from the club’s annual financial statements, or other direct sources, for the 2004/05 season. In some cases, the annual financial statements do not cover a whole season, but are for the calendar year, in which case we have used the figures for the most recent calendar year available.\n\nWe use the terms ‘revenue’ and ‘income’ interchangeably. Revenue excludes player transfer fees, VAT and other sales related taxes. In a few cases we have made adjustments to total revenue figures to enable, in our view, a more meaningful comparison of the football business on a club by club basis. For instance, where information was available to us, significant non-football activities or capital transactions have been excluded from revenue.\n\nBased on the information made available to us in respect of each club, to the extent possible, we have split revenue into three categories – being revenue derived from matchday, broadcast and commercial sources. Clubs are not wholly consistent with each other in the way they classify revenue. In some cases we have made reclassification adjustments to the disclosed figures to enable, in our view, a more meaningful comparison of the financial results.\n\nMatchday income is largely derived from gate receipts (including season tickets and memberships). Broadcast income includes revenue from television and radio and from both domestic and international competitions. Commercial income includes sponsorship (mainly derived from brand/name placing on team shirts and around stadia), conference, catering and merchandising.\n\nThe publication contains a variety of information derived from publicly available or other direct sources, other than financial statements.\n\nWe have not performed any verification work or audited any of the information contained in the club financial statements for the purpose of this publication.\n\nAll figures for the 2004/05 season have been translated at 30 June 2005 exchange rates (£1 = €1.4806). Comparative figures have been extracted from previous editions of the Deloitte Football Money League.\n\nThere are many ways of examining the relative wealth or value of football clubs – and at Deloitte we have developed sophisticated models of anticipated future cash flows to help potential investors or sellers do just that. However, for an exercise such as this, there is insufficient public information to do that. Here – in the Deloitte Football Money League – we use revenue as the most easily available and comparable measure of financial wealth. Revenue, like salary for an individual, is not the be all and end all of wealth, but all would agree that – as a starting point – it is better to have more than less, and the choice of how to spend it.\n\nHow we did it\n\nWe have used, for each club, the figure for total revenue extracted from the club’s annual financial statements, or other direct sources, for the 2004/05 season. In some cases, the annual financial statements do not cover a whole season, but are for the calendar year, in which case we have used the figures for the most recent calendar year available.\n\nWe use the terms ‘revenue’ and ‘income’ interchangeably. Revenue excludes player transfer fees, VAT and other sales related taxes. In a few cases we have made adjustments to total revenue figures to enable, in our view, a more meaningful comparison of the football business on a club by club basis. For instance, where information was available to us, significant non-football activities or capital transactions have been excluded from revenue.\n\nBased on the information made available to us in respect of each club, to the extent possible, we have split revenue into three categories – being revenue derived from matchday, broadcast and commercial sources. Clubs are not wholly consistent with each other in the way they classify revenue. In some cases we have made reclassification adjustments to the disclosed figures to enable, in our view, a more meaningful comparison of the financial results.\n\nMatchday income is largely derived from gate receipts (including season tickets and memberships). Broadcast income includes revenue from television and radio and from both domestic and international competitions. Commercial income includes sponsorship (mainly derived from brand/name placing on team shirts and around stadia), conference, catering and merchandising.\n\nThe publication contains a variety of information derived from publicly available or other direct sources, other than financial statements.\n\nWe have not performed any verification work or audited any of the information contained in the club financial statements for the purpose of this publication.\n\nAll figures for the 2004/05 season have been translated at 30 June 2005 exchange rates (£1 = €1.4806). Comparative figures have been extracted from previous editions of the Deloitte Football Money League.\n\nThere are many ways of examining the relative wealth or value of football clubs – and at Deloitte we have developed sophisticated models of anticipated future cash flows to help potential investors or sellers do just that. However, for an exercise such as this, there is insufficient public information to do that. Here – in the Deloitte Football Money League – we use revenue as the most easily available and comparable measure of financial wealth. Revenue, like salary for an individual, is not the be all and end all of wealth, but all would agree that – as a starting point – it is better to have more than less, and the choice of how to spend it.\n\nHow we did it\n\nWe have used, for each club, the figure for total revenue extracted from the club’s annual financial statements, or other direct sources, for the 2004/05 season. In some cases, the annual financial statements do not cover a whole season, but are for the calendar year, in which case we have used the figures for the most recent calendar year available.\n\nWe use the terms ‘revenue’ and ‘income’ interchangeably. Revenue excludes player transfer fees, VAT and other sales related taxes. In a few cases we have made adjustments to total revenue figures to enable, in our view, a more meaningful comparison of the football business on a club by club basis. For instance, where information was available to us, significant non-football activities or capital transactions have been excluded from revenue.\n\nBased on the information made available to us in respect of each club, to the extent possible, we have split revenue into three categories – being revenue derived from matchday, broadcast and commercial sources. Clubs are not wholly consistent with each other in the way they classify revenue. In some cases we have made reclassification adjustments to the disclosed figures to enable, in our view, a more meaningful comparison of the financial results.\n\nMatch", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-sports_and_fitness-part1", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-sports_and_fitness-part1/part-00-00000.npy", "text": "; only 2% of the adult population was over 30 inches in 2004. This improved to 18% by 2009, and held steady through 2011. The new striped bass regulations maintained the two-fish creel limit throughout the year but require all striped bass between 26 to 36 inches be released from November 1 through May 31. There was no size limit from June-October.\n\nThe protective slot limit initiated in 2006 was modified in 2015, after data indicated there were too many striped bass between 26 and 29 inches and most fish after reaching this size experienced very little or no growth. It should only take striped bass an average of two years to grow from 26 to 30 inches but after 2012, most striped bass never reach 30 inches due to poor growth. For example, 10 year old striped bass in 2014 averaged 29.5 inches, but should have\nbeen approximately 36 inches long at that age. However, growth for younger fish has remained good and stable for the same time period. The new protective slot limit was adjusted in 2015 to 30-40 inches (only for the months of Nov-May), up from 26-36 inches initiated in 2006. Anglers who prefer catch-and-release of 26-29 inch fish should continue that practice. Excessive harvest of this size group is not necessary to improve growth, some catch-and-release will still be necessary to maintain a trophy fishery.\n\nStudies have consistently shown that catch and release of striped bass in the summer months results in high mortality. Most of these striped bass die 1-2 days after release and most sink to the bottom and never surface. Catch and release mortality appears to be especially high for the larger fish. Consequently, anglers should not be targeting large striped bass with the intent of catch and release during the summer months. Smaller fish (generally < 22 inches) generally survive summer release rather well. Department of Game and Inland Fisheries encourages striped bass anglers to stop fishing after catching their 2-fish limit in the months of June-September and occasionally during warm periods in October. Catch-and-release is recommended for striped bass from November through May.\n\nStriped bass are distributed throughout the lake during most of the year, but are concentrated in lower lake (between the dam and buoy 64 of the Roanoke Arm and up to buoy 40 of the Blackwater Arm) areas during the summer months. Coves are typically not very productive for striped bass during the summer, so anglers should concentrate their efforts on the main lake when water temperatures begin to rise. Some of the bigger coves and the upper ends of the lake are more productive during the fall, winter and spring months. Although these are the general areas most striped bass are caught, these fish are very mobile and may change locations continuously depending on forage availability, water temperatures, and spawning. Striped bass anglers utilize a variety of fishing methods such as drifting or slow trolling live shad, trolling (plugs, bucktail jigs, swim baits, umbrella rigs), casting lures (flukes, swim baits, bucktail jigs), or vertical jigging. Anglers use live shad throughout the year, trolling is most popular during the warmer months, casting lures is most productive during the winter and spring at night. All of the above methods are utilized during the winter months.\n\nThere is an ongoing striped bass tagging study to provide biologists with information on striped bass catch rates, harvest rates, movement, survival, and population dynamics. The fish tags are yellow, approximately three inches in length, attached near the dorsal fin and should be easily recognized without dissection. Tagged fish do not have to be harvested in order to collect the reward. Cut or clip tags (do not pull tags loose) from the fish you wish to release. Anglers are encouraged to submit all tags collected from striped bass to the address printed on the tag with the following information: date fish was caught, marker number nearest to location of capture (also include the marker letter, i.e. R31), length of fish and indicate whether the fish harvested or released. Rewards are assigned to specific tags and not to any particular size of fish. All returned tags will be worth one of the following amounts: $5, $10, $20, $35, or $50.\n\nThe Department of Game and Inland Fisheries does not typically collect older and larger (over 8 lbs) striped bass in their routine sampling, but these data are very important for monitoring the fishery and new regulations. Any willing angler is asked to keep striped bass heads from fish they harvest larger than 26 inches or 8 pounds. The heads can be frozen and delivered to a freezer at “Captain’s Quarters”, located next to Hales Ford Bridge, where DGIF will pick them up. Be sure to fill out and include a form detailing the length of each fish and when it was caught upon drop off. If you would like to know the age and year the fish was stocked, include your mailing address and you will be sent the information after the fish has been\naged. Fish have an inner ear bone in the head (termed “otolith”), from which the age is\ndetermined. Each otolith contains rings similar to tree rings and can be counted for an accurate\nage determination.\n\nThis reservoir has limited crappie habitat. Although the lake produces many quality-size\ncrappie, anglers should not expect to consistently catch large numbers of crappie. The crappie\npopulation is smaller than some other Virginia reservoirs but the quality of these fish is very\ngood. Large coves and the upper ends of the reservoir should be the most productive, especially\nnear fallen trees, brush piles, and some docks. During the 2014 angler creel survey, crappie\nanglers were most productive in March-May but October-December are typically good months\nfor crappie fishing. Fewer crappie are caught in June-September. DGIF sampling indicates the\ncrappie population is stable and has shown little change for many years. The crappie fishery\nshould remain good and no substantial changes in the population are expected.\n\nSunfish and catfish are also present at Smith Mountain Lake. Sunfish are abundant but\ncompetition with shad prevents good growth, so most of these fish are small. Channel catfish,\nflathead catfish, and white catfish make up the catfish fishery. Flathead and channel catfish are\nmost abundant in the upper reaches of the Roanoke Arm and white catfish are found primarily in\nthe lower third of the reservoir where the water clarity is much better. Catfish anglers can enjoy\ngood fishing from the shoreline and docks.\n\nWhite perch are a relatively new species to the lake and have recently provided great\nfishing opportunities. This species can be found throughout the reservoir but higher\nconcentrations are typically found in the lower end (dam end) of the reservoir. White perch\ngenerally travel in large groups and can provide fast action after a “school” of white perch is\nlocated. Anglers should look for large numbers of smaller fish on their electronics, especially\nalong points in 15-30 feet of water near channels. After locating a “school” of white perch,\nvertical jig small spoons or drop baits (small pieces of cut bait or worms) and prepare for a lot of\naction. White perch can also be found along shoreline structure especially in the spring and fall\nmonths but will go deeper when the water starts to warm up in the summer or gets too cold in the\nlate fall and winter.\n\nNumerous public and private boat ramps and marinas are found around the lake. In\naddition, there are very nice handicapped-accessible fishing piers located in the Smith Mountain\nLake State Park and Franklin County Park. Additional information on lodging, marinas, and\nother attractions can be obtained by calling the Smith Mountain Lake Visitors Center at 1-800-\n676-8203 or by visiting the Smith Mountain Lake Visitor Center online at www.smith-mountain-\nlake-visitor-center.com. Additional information concerning the fishery can be obtained by\ncalling DGIF at 434-525-7522.<|endoftext|>Bear Necessities Fan Shop\nAnnual Tent Sale\n\nBest prices of the year\n\nTuesday, April 25–Friday, April 28, Noon–5 p.m.\nHarold Alfond Sports Arena\n\nAre you a pro at playing cornhole?\n\nStop in and get $25 in Tech Bucks for University Bookstore’s Tech Center!\n\nGet the best deals of the season\n\nShop to win:\nMalibou Ocean Kayak, life preserver and paddle\n\nShow us your skills with four chances to score big discounts:\n20%: 1 bag on the board\n30%: 1 bag in, 1 on the board\n50%: 2 bags in, 2 bags on the board\n\nGet four in and win a piece of clothing or general merchandise of your choice!\n\nTo enter:\nShop at Bear Necessities Fan Shop or University Bookstore, April 25–April 29\nFill out an entry slip. Online purchases made during this time are also entered to win.\nWinner drawn on Monday, May 1, 2023.\n\nNo purchase necessary to enter. Shipping costs will be charged if winner wishes to have the kayak shipped.\n\n$899 value\n\nIn complying with the letter and spirit of applicable laws and pursuing its own goals of diversity, the University of Maine System", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " wanted to see near the train station.\nLIGHTING THE BRIDGE\n\nThe entrance of the Upham’s Corner station is under an unlit bridge that caused many neighbors to voice concerns about the safety of the area. In order to help residents imagine the space in new ways, we installed a temporary lighting exhibit that transformed people’s experience of walking under this bridge at night. The reactions were joyful and positive for pedestrians and drivers alike.\n3. Implementation Dialogues November 2014\n\nAfter gathering the many forms of feedback, ideas and stories, we put together recommendations for both station areas and presented them at interactive Implementation Dialogues in each community. Residents, public agency representatives, merchants and organization leaders were all in the room together discussing the possibility of these recommendations and beginning to collectively identify the resources and leadership to move from dialogue to implementation.\nChapter 3: FOUR CORNERS RECOMMENDATIONS, ACTION PLANS\nFOUR CORNERS/GENEVA:\nRecommendation 1: Install Informational Signage\nRecommendation 2: Install Tech Amenities\nRecommendation 3: Activate the Bridge & Station\nRecommendation 4: Install a “Tea Stop”\nRecommendation 1: Increase Informational Signage\n\nProvide bold train/bus service information at both station entries to build ridership.\n\nOur “flag facts” on bold banners are a temporary step towards increasing the usefulness of the commuter rail for the surrounding community by raising awareness about how (and when) it works. On a more whimsical note, temporary “platform poetry” chalk installations by local artists would add to the local art already featured in the stations.\n\nWhat Will Improve\n\n☑ Commuters will be better informed about bus/train arrivals and be encouraged to use them more\n\n☑ People will know how the train can get them where they want to go\nWhat local residents and merchants said at the Implementation Dialogues:\n\n- What about a “Next Train” sign visible from the Tea Stop?\n- What about a way to use your phone to purchase Charlie Card or transportation fee for train & bus?\n- Until we get a nice, big poster with the schedule on it? Please?\n- We need banners and signs on the Geneva side too.\n- Until we get an electronic board/sign announcing trains, can we have a nice, big poster with the schedule on it? Please?\n\nWhere we’ve seen it\n\nMBTA Silver Line gives commuters updated information, Boston\n### RECOMMENDATION 1: INSTALL INFORMATIONAL SIGNAGE\n\n**IMPLEMENTATION TIMELINE & RESOURCES**\n\n
\n\n
\n
Action Step
\n
Already Willing Supporters
\n
Potential Allies
\n
Cost Estimate, if applicable
\n
\n\n\n
\n
1) Install informational vinyl banners at both station entrances
\n
Fairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, MBTA
\n
MBTA, Alpha Construction
\n
*$30 - 60 per banner, varies with size
\n
\n
\n
2) Install bold permanent signage including clarification on schedules and meaning of “Inbound” and “Outbound”
\n
Fairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, Fairmount Indigo Transit Coalition (FITC)
\n
MBTA, Public officials
\n
\n
\n
\n
3) Install wayfinding signage of nearby parks, restaurants, artist studios, and other neighborhood gems
\n
Fairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, Artist in Residence, Fairmount Cultural Corridor
\n
MBTA, Office of New Urban Mechanics, Healthy Dorchester
\n
\n
\n
\n
4) Research affordable and creative options and install LED displays indicating bus/ train arrival updates at the street level
\n
Fairmount/Indigo Line CDC Collaborative, FITC, MBTA
\n
FITC, Public officials, Office of Urban Mechanics, Fairmount Cultural Corridor, Area colleges (Wentworth, Mass. College of Art), Science Museum
\n
*$200 for equipment only, not including connection with live MBTA schedule updates
\n
\n\n
\n\n*Please see p.46 for Cost Estimate Sources*\nRecommendation 2: Install Tech Amenities\n\nInstall at both station entrances as a top priority service requested that can also encourage more activity at the station.\n\nBoston is fast becoming a “wireless city”, and Four Corners residents expressed eagerness to be a part of that. Installing tech amenities like wifi and phone charging stations could contribute to better connectivity between the train station, bus stops, and the community.\n\nWhat Will Improve\n\n✔ Phone charging on-the-go and in case of emergencies\n\n✔ People can work or play while waiting\nWhere we’ve seen it\n\nConvenient Bright Box public charging station, New York\n\nWhat local residents and merchants said at the Implementation Dialogues:\n\nI like how this idea (wifi and charging) will increase the convenience of commuters\n\nI looked up “how to build a solar charging station” and found a great hackers site that explains how to build a weatherproof one on the cheap. Any takers?\n\nWicked Free Wifi\nBoston’s public wireless network is prevalent in Roxbury\n### RECOMMENDATION 2: INSTALL TECH AMENITIES\n\n#### IMPLEMENTATION TIMELINE & RESOURCES\n\n
\n\n
\n
Action Step
\n
Already Willing Supporters
\n
Potential Allies
\n
Cost Estimate, if applicable
\n
\n\n\n
\n
1) Expedite roll-out of Wicked Free Wifi to Four Corners/ Geneva station area
\n
Fairmount/Indigo Line CDC Collaborative, Rep. Russell Holmes, FC Artist in Residence
\n
Wicked Free Wifi, Mayor Walsh, Other public officials
\n
\n
\n
\n
2) Connect electricity and install outlets at platform and/or bus shelter
\n
Fairmount/Indigo Line CDC Collaborative, Four Corners Main Street
\n
MBTA, City of Boston, Public Works
\n
\n
\n
\n
3) Create solar charging station project with community volunteers and/or solar roof on bus shelter and station roof
\n
Fairmount/Indigo Line CDC Collaborative, Bill Perkins, Boston ReStore
\n
FC Artist in Residence, MBTA, Office of New Urban Mechanics, Public Works Dept, Codman Square NDC (CSNDC), Eco Innovation District
\n
$100-200
\n
\n\n
\n\n*Please see p.46 for Cost Estimate Sources*\nRecommendation 3: Activate the Bridge Bench & Public Art\n\nFoster intergenerational social interactions while people are waiting for the bus and create better visibility for the buses (than the current shelter provides).\n\nPart of creative placemaking is about bringing neighbors together to activate spaces and build community. This simple bench offers bus riders not just a place to rest where they can see the bus, but a chance to talk, play games, and learn about the commuter rail. The one prototype bench we put in has been heavily used and community members want more!\n\nWhat Will Improve\n\n✓ People feel reassured when they see the bus coming from where they sit\n✓ More seating available, better for elderly\n✓ More fun, chances to talk, let kids play\nWhat about interactive poetry?\n\nI like how the game component brings people together.\n\nCity Year Boston could help with painting and maintenance.\n\nWhat about an overhang or heaters to protect us in the winter?\n\nWhat about interactive public art, like the “Kendall Band” at MIT stop?\n\nWhat about bilingual reading material for while you sit? It could be stored in an arm rest.\n### RECOMMENDATION 3: ACTIVATE THE BRIDGE: BENCH AND PUBLIC ART\n\n#### IMPLEMENTATION TIME LINE & RESOURCES\n\n
\n\n
\n
Action Step
\n
Already Willing Supporters
\n
Potential Allies
\n
Cost Estimate, if applicable
\n
\n\n\n
\n
1) Create public art program for artists, residents, and merchants interested in collaborating on bench creation • Seek in-kind donations for construction and materials
\n
Fairmount/Indigo Line CDC Collaborative, Four Corners Main Streets, Greater Four Corners Action Coalition, Four Corners Artist in Residence, Public Art Salons, Erie Ellington and Brinsley Partnership Neighborhood Association (EEBPNA)
\n
Rep. Russell Holmes, MBTA, Public Works Dept, Hardware stores
\n
\n
\n
\n
2) Create sustainable public art programming to continue public engagement in arts activities
\n
Fairmount/Indigo Line CDC Collaborative, Four Corners Artist in Residence, Fairmount Cultural Corridor, FC Main Streets, EEBPNA
\n
Erick Jeanne Center for the Arts, Dorchester Arts Collaborative, Caribbean Arts Gallery, MBTA, Rep. Russell Holmes, CSNDC, Fairmount Cultural Corridor, Neighborhood drummers, poetry and dance groups
\n
\n
\n
\n
3) Negotiate agreements with public agencies and property owners involved regarding activity on the bridge
\n
Fairmount/Indigo Line CDC Collaborative, FC Main Streets, EEBPNA
\n
MBTA, Rep Holms, CSNDC
\n
\n
\n\n
Test Track Sections Evaluate Use of Cold Central-Plant Recycling for High-Volume Roads\n\nCold central-plant recycling (CCPR) is gaining interest as a cost-effective alternative for base layers in pavement reconstruction. CCPR combines reclaimed asphalt pavement (RAP) with foamed or emulsified asphalt in a central production plant without the application of heat. The resulting material is handled much like asphalt mixtures during pavement construction; the material is placed with conventional pavers and compacted with traditional rollers.\n\nThe CCPR process provides an opportunity to use excessive RAP stockpiles in a beneficial application. Although the CCPR material is similar to that produced using cold in-place recycling (CIR), CCPR offers more opportunities for quality control during production and can also be used in areas where CIR would be impractical. CCPR has been used more often in the western U.S., including California and Nevada, where it has been used successfully on city streets and other low-volume applications. While the technique is not new, advances in binder materials, RAP processing and cold mix production have made CCPR an increasingly attractive choice for producing an economical material for a long-lasting pavement.\n\nVirginia’s Experience on I-81\n\nIn 2011, the Virginia Department of Transportation (VDOT) placed a CCPR base on a 3.66-mile section of I-81 in Augusta County. This high-profile project combined three recycling processes—CCPR, CIR and full-depth reclamation (FDR)—for the first time ever on one Interstate highway project.\n\nSignificant deterioration of the existing underlying pavement structure warranted complete reconstruction of the right-hand lane. The existing asphalt was milled, leaving just one inch of asphalt that was processed using FDR with the existing aggregate base and upper portion of the subgrade. The RAP from milling was then mixed with foamed asphalt and Portland cement in an onsite CCPR mobile plant and placed in a 6-inch layer using conventional paving equipment. The CCPR base was covered with 6 inches of conventional asphalt overlay. In the left-hand passing lane, the existing pavement structure was in better condition. Since no reconstruction of the aggregate base was needed, this lane was recycled in-place using the CIR method to a depth of five inches (following a 2-inch pre-mill operation) and topped with 4 inches of conventional asphalt mix.\n\nUsing these time-saving onsite recycling methods allowed VDOT to employ a unique traffic-management plan incorporating a single lane closure and detour for passenger cars. If conventional construction techniques had been used, the reconstruction project could have required building another lane to accommodate\nwork-zone traffic and could have taken years rather than months to complete. Recycling not only saved time on this project, but also huge quantities of new materials, as well as the fuel consumed in transporting them. By using onsite recycling techniques such as CCPR, CIR and FDR, this $7.64 million project allowed the repair of deep failures at significant taxpayer savings and with substantially less construction-related traffic delays.\n\nCCPR Research at NCAT Pavement Test Track\n\nVDOT is sponsoring three sections on the 2012 NCAT Pavement Test Track research cycle to further evaluate the use of CCPR base material for high-volume applications. In order to determine the structural contribution of CCPR base in pavement design, all three sections are instrumented for recording structural response under loading. Sections N3 and N4 are comparing the overlay thickness of conventional asphalt mixes (6 inches vs. 4 inches, respectively) when placed over a CCPR base. Section S12 compares FDR with the conventional base and subgrade construction used in N4.\n\nCross-sections of the three VDOT-sponsored test sections are pictured in Figure 1. All three were built on the same subgrade material. Sections N3 and N4 were built on a crushed granite base course, while S12 featured a stabilized base course that was constructed using FDR, treated with cement and compacted in place. A CCPR layer was constructed above the base layers. Superpave mixtures were placed on top of the CCPR layer and each section was surfaced with stone matrix asphalt (SMA). Section N3 had the thickest asphalt concrete (AC) layers (6 inches total), while the other two sections used approximately 4 inches of AC above the CCPR. Strain gauges and temperature probes were embedded during construction. Although other gauges were also installed, the focus here is solely on the horizontal strain measurements as an indicator of how bottom-up cracking may develop. The temperature probes monitor mid-depth pavement temperature crucial to understanding the environmental effects on these pavements.\n\nProduction of the CCPR base at the NCAT Pavement Test Track is shown in Figure 2. The RAP was first processed to a top size of one-half inch and then mixed with 2 percent foamed asphalt binder and 1 percent Portland cement in an onsite mobile cold recycling plant. The CCPR material was placed in a single lift and compacted to a target layer thickness of 5 inches using conventional paving equipment.\n\nA fleet of heavily loaded trucks circles the track 16 hours a day, five days a week, resulting in 10 million equivalent single axle loads (ESALs) applied over a two-year period. The sections have been subjected to weekly structural response monitoring since the onset of trafficking in October 2012. Figure 3 shows the horizontal strain response in each section through January 2014. As expected, the lowest strain levels were measured in S12 where the stabilized base course contributes to less overall bending of the AC layers. The highest strain levels were observed in N4, which had the thinnest AC over the conventional aggregate base layer, while section N3—with 6 inches of AC—experienced intermediate strain levels. Also of note is the general insensitivity of S12 to the change in season and temperature. While N3 and N4 both experienced significantly higher strain levels during the warm summer months and lower strains during cooler periods, S12 did not—presumably due to the stabilized base course not changing appreciably with\ntemperature. Since cracking has not been observed in any of these sections, it remains to be seen what effect the various strain levels have on cracking performance. At this point, the sections are all performing well.\n\nIn addition to monitoring the strain response, the sections are tested using the falling weight deflectometer (FWD) several times per month. This testing helps determine the backcalculated modulus of the AC. Figure 4 shows the backcalculated AC modulus of each section at a standard reference temperature of 68°F. The scatter in the data on particular test dates represents normal spatial variation throughout each section. Linear trendlines fit to each data set show that the moduli are generally holding steady over time. This is an indicator of structural health, as one would expect a drop in modulus, or highly erratic modulus values, if damage were occurring in a section. N3 and N4 show a very slight decline over time while S12 seems to have a slight increase over time. This may be due to the backcalculation process attributing some of the stabilized base material, which is curing over time, to the asphalt concrete. In any case, the backcalculated moduli values are signs of sound structures through this point of the experiment.\n\nContinuing Use of CCPR in Virginia\n\nTo date, both the I-81 recycling project and the CCPR test sections at NCAT are showing good performance. “VDOT is testing these recycling technologies in real-world heavy-application scenarios, and based on the successful performance we’ve seen so far, we’d like to move forward on additional projects,” says Trenton Clark, Director of Engineering for the Virginia Asphalt Association. VDOT is currently revising their specifications for CCPR as well as developing permissive use specifications that will allow for alternate bids on cold recycling vs. traditional", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " 364-3188 or gularte@watertransit.org\n\nWestern Contra Costa Transit Authority (WestCAT)\nRob Thompson\n(510) 724-3331 or rob@westcat.org\nSmall Business Certifications\n\n(all links below are ‘active’ so please just click on them to go to the resource):\n\n- Disadvantaged Business Enterprise (DBE) Certification\n- California Small Business Enterprise Certification (SBE)\n- California Disabled Veteran Business Enterprise (DVBE)\n- Minority, Women, and LGBT Business Enterprise (MBE, WBE, LGBTBE) Certification\n- San Francisco County Local Business Enterprise (SF LBE)\n- Oakland Local Business Enterprise (OAK LBE)\n\nThe California Small Business Development Center (SBDC) Program\n\nThe California Small Business Development Center (SBDC) Program is the leader in providing business owners and entrepreneurs with the tools and guidance needed to become successful. Direct and personalized assistance is provided to entrepreneurs through professional consulting, supplemented by low-cost or free classes. SBDC consultants are professionals with extensive experience in assisting business owners across a wide variety of different industries and are able and available to assist with all aspects of a business’s management and growth. These services are delivered throughout California via an extensive network of local Centers.\n\n- Alameda: ACSBDC.org\n- Contra Costa: ContraCostaSBDC.org\n- Del Norte: NorthCoastSBDC.org\n- Marin: MarinSBDC.org\n- Mendocino: MendoSBDC.org\n- Napa: NapaSonomaSBDC.org\n- San Francisco: SFSBDC.org\n- San Mateo: SanMateoSBDC.org\n- Santa Clara: SVSBDC.org\n- Santa Cruz: SantaCruzSBDC.org\n- Solano: SolanoSBDC.org\n- Sonoma: SonomaSBDC.org\n- Humboldt: NorthCoastSBDC.org\n\nSCORE is the nation’s largest network of business mentors, with more than 10,000 volunteers in 300 chapters nationally. SCORE mentors help businesses get off the ground, grow, and achieve their goals through education and 1-on-1 counselling.\n\n- East Bay: EastBay.SCORE.org\n- North Bay: NorthCoast.SCORE.org\n- Central Coast: SantaCruz.SCORE.org\n- South Bay: SiliconValley.SCORE.org\n- San Francisco: SanFrancisco.SCORE.org\n\nWomen’s Business Centers (WBCs) represent a national network of over 100 educational centers throughout the United States and its territories, which exist assist women in starting and growing small businesses.\n\n- San Francisco: RenCenter.org\n- East Bay: AnewAmerica.org\n- Mendocino: WestCompany.org\n- South Bay: AnewAmerica.org\n\nThe Veteran’s Business Outreach Center (VBOC) provides services such as business training, counseling, mentoring, and referrals for veterans owning or considering starting a business. Services are offered to veterans at no cost.\n\nVBOCIX.org\nThe Northern California Procurement Technical Assistance Center (PTAC) can help you sell to federal, state, local, or tribal government agencies. Services are provided at no cost.\n\nNorCalPTAC.org\n\nBART would like to thank our BART SBSS Program Partner, the United States Small Business Administration.\n\nVIEW BART SBSS CALENDAR\n\nCAN'T FIND WHAT YOU ARE LOOKING FOR? CONTACT US AT SBSUPPORTSERVICES@BART.GOV<|endoftext|>Single-track train timetabling with guaranteed optimality: Branch-and-bound algorithms with enhanced lower bounds\n\nXuesong Zhou a,*, Ming Zhong b\n\na Department of Civil, Construction and Environmental Engineering, North Carolina State University, Raleigh, NC 27695, USA\nb Department of Decision and Information Technologies, Robert H. Smith School of Business, University of Maryland, College Park, MD 20742, USA\n\nReceived 2 June 2005; received in revised form 9 April 2006; accepted 5 May 2006\n\nAbstract\n\nA single-track train timetabling problem is studied in order to minimize the total train travel time, subject to a set of operational and safety requirements. This research proposes a generalized resource-constrained project scheduling formulation which considers segment and station headway capacities as limited resources, and presents a branch-and-bound solution procedure to obtain feasible schedules with guaranteed optimality. The search algorithm chronologically adds precedence relation constraints between conflicting trains to eliminate conflicts, and the resulting sub-problems are solved by the longest path algorithm to determine the earliest start times for each train in different segments. This study adapts three approaches to effectively reduce the solution space. First, a Lagrangian relaxation based lower bound rule is used to dualize segment and station entering headway capacity constraints. Second, an exact lower bound rule is used to estimate the least train delay for resolving the remaining crossing conflicts in a partial schedule. Third, a tight upper bound is constructed by a beam search heuristic method. Comprehensive numerical experiments are conducted to illustrate the computational performance of the proposed lower bound rules and heuristic upper bound construction methods.\n\nKeywords: Train timetabling; Lagrangian relaxation; Branch and bound; Heuristics; Railway\n\n1. Introduction\n\nA train timetable defines the planned arrival and departure times of trains to/from yards, terminals and sidings, and train scheduling plays a vital role in managing and operating complex railroad systems. From a marketing point of view, the level-of-service of train timetables is an important factor that affects travelers’ and freight carriers’ decisions in choosing desirable transportation modes. From a railroad operations point of...\nA wide range of studies have been devoted to the train scheduling problem in the last three decades, particularly regarding the development of mathematical formulations and solution algorithms. Szpijgel (1973) first modeled the train scheduling problem as a mixed integer program and applied Greenberg’s (1968) branch-and-bound solution framework (for a general job shop machine scheduling problem) to find timetables that minimize the total transit time, subject to overtaking and crossing headway constraints. Jovanovic and Harker (1991) presented a nonlinear integer programming model that minimizes the deviation between planned schedules and actual schedules, and used a branch-and-bound procedure to generate feasible meet-pass train plans. Carey (1994a,b) and Carey and Lockwood (1995) developed an iterative decomposition approach for solving the train timetabling and pathing problem in a rail network with one-way and two-way tracks; moreover, several node branching, variable fixing and bounding strategies were presented to reduce the search space. Higgins et al. (1996) developed a nonlinear integer programming model for minimizing the total train delay and fuel cost with variable train velocities, and they also presented a branch-and-bound solution algorithm with a lower bound estimator that utilizes a look-ahead rule to calculate the least delay for the remaining conflicts in a partial schedule. As remarked by the authors, the lower bound rule might overestimate the actual remaining delay for some trains theoretically, but only in exceptional cases. Their original efforts in this direction highlight the need for further investigations on strict lower bound rules in an inept enumeration search framework. It should be also noted that several stochastic analytical models (e.g., Petersen and Taylor, 1982; Chen and Harker, 1990; Higgins and Kozan, 1998) have been developed to estimate the average delay of a train schedule, but these models are not suitable for serving as strict lower bound rules in the deterministic case. Brannlund et al. (1998) proposed an integer programming model to find a profit-maximizing timetable and designed a Lagrangian relaxation method to dualize track capacity constraints. The resulting subproblems were solved by the shortest path algorithm in conjunction with several improved dual updating schemes. Based on a graph-theoretic formulation for the periodic-timetabling problem in a rail line, Caprara et al. (2002) presented a Lagrangian relaxation solution method, in which a dynamic constraint generation (often referred to as relax-and-cut) scheme was used to handle a large number of dualized constraints. In general, without being embedded into the branch-and-bound search scheme, the Lagrangian relaxation approach can hardly guarantee the discovery of optimal solutions, due to the existence of duality gaps and the limitation of primal heuristic search algorithms. Kroon and Peeters (2003) developed a periodic event scheduling model to consider variable trip times for the cyclic railway timetabling problem. Zhou and Zhong (2005) proposed a multi-mode resource-constrained project scheduling formulation to consider acceleration and deceleration time losses in double-track train timetabling applications, and designed several dominance rules to find Pareto optimum schedules in an intercity passenger corridor.\n\nThe train scheduling problem is known to be NP-hard (Cai et al., 1998; Caprara et al., 2002), and optimal solutions are typically unattainable in large-scale and complex instances. To meet the computational requirements in real-world applications, a heuristic approach becomes a necessity for generating feasible and suboptimal solutions. Specifically, a number of simple priority rules have been widely used because of their low computational complexity and easy implementation. Given a pair of conflicting trains, a simple priority rule determines which train to schedule next by utilizing underlying objective functions, for instance, the total delay for the minimal travel time criterion (Petersen et al., 1986; Kraay and Harker, 1995), the schedule deviation and tightness for the minimal deviation criterion (Chen and Harker, 1990), train priorities (Petersen et al., 1986), and the number of passengers transported (Ad", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " ELD Logout event with a note “ELD Disconnection”\n o a Remark with the note “VBUS Disconnected”\n\nNote:\n\n- The graph-grid overlay periods of driver’s indications of authorized personal use of CMV and yard moves using a different style line (such as the dashed or dotted line in amber color).\n- When ‘Show all events’ toggle switch is off, the following Remark events are hidden: Diagnostic/Malfunction clears, Vbus Connect/Disconnect, Authenticate/Unauthenticate, Dvir Not performed/ Dvir Completed, Log certified remark, Start of day Odometer remark, and Toll road start/stop.\nCrossing Boundaries\n\nThe border crossing calculation uses the VBUS GPS coordinates if they are available, and the android coordinates if they are not. The following instances happens when the driver crossed boundaries between Canada and US (vice versa):\n\na. If the GPS coordinates are changed to a different state or province, a remark event will be recorded in the driver log.\n\nb. If the current location is in Canada, the driving rules will automatically switched to Canadian rules. Similarly, if the location is in the US, the driving rules automatically switched to US rules.\n\nc. If there is a co-driver logged in, both the remark and the rules changes will be occurring to be applied for him/her as well.\n5.3 Malfunction and Data Diagnostic Events\n\nAt each instance when an ELD malfunction or data diagnostic event is detected or cleared by the ELD, the ELD records the event. The recorded malfunctions and data diagnostic events are inconsistencies found while monitoring the app/ELD against FMCSA compliance requirements. These instances are indicated in the application header and in the Android notification toolbar with the letters M and D, respectively.\n\n**Note:** The ELD Data Diagnostic indicator provides notification of active data diagnostics events applicable to the active driver. The Data Diagnostics “D” icon will flash in amber color if there are new active Data Diagnostics events that is not yet reviewed by the driver and will only turn back to white once the Data Diagnostic dialog is closed after being reviewed by the driver. There will also be a notification in the Android toolbar indicating a malfunction or a data diagnostic event.\n\nThe Malfunction and Data Diagnostic events note can also be edited on the edit log screen.\n\nTap the **Clear button** to clear the malfunction or data diagnostic event detected.\n\nTo clear all Data Diagnostic Events, tap the **Clear All button**.\n
\n\n
\n
Requirement No.
\n
Event Code
\n
Event Name
\n
Description
\n
\n\n\n
\n
4.6.1.1
\n
P / Power MF
\n
Power Malfunction
\n
An ELD must set a power compliance malfunction if the power data diagnostics event described in paragraph 4.6.1.1(a) of this appendix indicates an aggregated in-motion driving time understatement of 30 minutes or more on the ELD over a 24-hour period across all driver profiles, including the unidentified driver profile.
\n
\n
\n
4.6.1.2
\n
E / Sync MF
\n
Engine Synchronization Malfunction
\n
An ELD must set an engine synchronization compliance malfunction if connectivity to any of the required data sources specified in section 4.3.1 of this appendix is lost for more than 30 minutes during a 24-hour period aggregated across all driver profiles, including the unidentified driver profile.
\n
\n
\n
4.6.1.3
\n
T / Timing MF
\n
Timing Malfunction
\n
The ELD must periodically cross-check its compliance with the requirement specified in section 4.3.1.5 of this appendix with respect to an accurate external UTC source and must record a timing compliance malfunction when it can no longer meet the underlying compliance requirement.
\n
\n
\n
4.6.1.4
\n
L / Pos MF
\n
Position Malfunction
\n
ELD records requiring location information must use the last valid position measurement and include the latitude/longitude coordinates.
\n
\n\n
\nAn ELD must monitor elapsed time during periods when the ELD fails to acquire a valid position measurement within 5 miles of the CMV’s movement. When such elapsed time exceeds a cumulative 60 minutes over a 24-hour period, the ELD must set and record a positioning compliance malfunction.\n\n### 4.6.1.5 R/DR MF Data Recording Malfunction\n\nAn ELD must monitor its storage capacity and integrity and must detect a data recording compliance malfunction if it can no longer record or retain required events or retrieve recorded logs that are not otherwise catalogued remotely by the motor carrier.\n\n### 4.6.1.7 S/Trans MF Data Transfer Malfunction\n\n(a) An ELD must implement in-service monitoring functions to verify that the data transfer mechanism(s) described in section 4.9.1 of this appendix are continuing to function properly. An ELD must verify this functionality at least once every 7 days. These monitoring functions may be automatic or may involve manual steps for a driver.\n\n(c) After an ELD records a data transfer data diagnostic event, the ELD must increase the frequency of the monitoring function to\ncheck at least once every 24-hour period. If the ELD stays in the unconfirmed data transfer mode following the next three 90 consecutive monitoring checks, the ELD must detect a data transfer compliance malfunction.\n\n
\n\n
\n
Requirement No.
\n
Event Code
\n
Event Name
\n
Description
\n
\n\n\n
\n
4.6.1.1
\n
1 / Pwd Diag
\n
Power Diagnostic
\n
An ELD must monitor data it receives from the engine ECM or alternative sources as allowed in sections 4.3.1.1-4.3.1.4 of this appendix, its onboard sensors, and data record history to identify instances when it may not have complied with the power requirements specified in section 4.3.1.1, in which case, the ELD must record a power data diagnostics event for the corresponding driver(s), or under
\n
\n
\n
Section
\n
Page
\n
Description
\n
\n
\n
\n
---------
\n
------
\n
-------------
\n
\n
\n
\n
4.6.1.2
\n
2
\n
Engine Synchronization Diagnostic
\n
\n
\n
\n
\n
\n
An ELD required to establish a link to the engine ECM as described in section 4.2 must monitor its connectivity to the engine ECM and its ability to retrieve the vehicle parameters described under section 4.3.1 of this appendix and must record an engine-synchronization data diagnostics event when it no longer can acquire updated values for the ELD parameters required for records within 5 seconds of the need.
\n
\n
\n
\n
4.6.1.4 (d)
\n
3
\n
Missing Data Elements Diagnostic
\n
\n
\n
\n
\n
\n
If a new ELD event must be recorded at an instance when the ELD had failed to acquire a valid position measurement within the most recent elapsed 5 miles of driving, but the ELD has not yet set a positioning compliance malfunction, the ELD must record the character “X” in both the latitude and longitude fields, unless location is 88 entered manually by the driver, in which case it must log the character “M” instead. Under the circumstances listed in this paragraph, if the ELD event is due to a change in duty status for the driver, the ELD must prompt the driver to enter location manually in accordance with section 4.3.2.7 of this appendix. If the driver does not enter the location information and the
\n
\n
\n
\n
Section
\n
Category
\n
Event Description
\n
\n
\n
\n
---------
\n
----------
\n
-------------------
\n
\n
\n\n
\n| 4.6.1.7 | Trans Diag | Data Transfer Diagnostic \n(b) If the monitoring mechanism fails to confirm proper in-service operation of the data transfer mechanism(s), an ELD must record a data transfer data diagnostic event and enter an unconfirmed data transfer mode. |\n| 4.6.1.6 | Unid Diag | Unidentified Driver Diagnostic \n(b) If more than 30 minutes of driving in a 24-hour period show unidentified driver on the ELD, the ELD must detect and record an unidentified driving records data diagnostic event and the data diagnostic indicator must be turned on for all drivers logged in to that ELD for the current 24-hour period and the following 7 days. \n(c) An unidentified driving records data diagnostic event can be cleared by the ELD when driving time logged under the unidentified driver profile for the current 24-hour period and the previous 7 consecutive days drops to 15 minutes or less. |\n| 4.6.1.8 | Other Diag | Other Diagnostic \nIn addition to the required monitoring schemes described in sections 4.6.1.1–", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "psilon_{i,u}^{(q)} - 1 \\right]^\text{T}.\n\\]\n\nOur testing experiences indicate that the parameter \\( \\lambda = 0.7 \\) is an appropriate value to combine the previous multiplier values with the current subgradient information. The step size parameter is updated as\n\n\\[\n\\alpha^q = \\mu^q \\frac{\\langle \\bar{L} - L^q \\rangle}{\\| A^q \\|},\n\\]\n\nwhere \\( \\bar{L} \\) is the optimal solution and \\( L^q \\) is the value of \\( L \\) at iteration \\( q \\). In our implementation, a feasible solution generated from a priority rule-based heuristic method is used to replace the optimal solution \\( \\bar{L} \\). Note that, \\( 0 < \\mu^q < 2 \\) is required to ensure theoretical convergence. Clearly, a small step size \\( \\mu^q \\) could lead to a slow convergence rate, but a large step size could result in serious oscillations. In our experiment, \\( \\mu^q \\) is set to \\( 1/(q + 1) \\), and we stop decreasing \\( \\mu^q \\) after a certain number of iterations.\n\nIt is well known that the applicability and effectiveness of the Lagrangian method rely on having a relatively small number of constraints to dualize. Since there are a total of \\( (2m - 1) \\times T \\) station and segment resources, the dimension of the capacity constraints in a train scheduling problem is extremely large, leading to a very large \\( \\| A^q \\| \\) but a negligible step size in Eq. (24). Recognizing that most of the resource constraints are non-binding in an optimal train scheduling solution, a relax-and-cut logic described in Caprara et al. (2002) is\nadapted here to dynamically relax resource capacity constraints by only dualizing a subset of constraints at every iteration. Specifically, if a resource has not been used within recent several iterations, the algorithm automatically resets the price for the unused resource back to zero. With this dynamic constraint generation scheme, the set of Lagrangian multipliers varies along the iterative process. In the branch-and-bound process, the previously optimized values of the multipliers at a predecessor node are used as the initial values for multipliers associated with the corresponding successor nodes.\n\n4.2. Crossing conflict-based lower bounds\n\nAlthough Lagrangian relaxation offers a natural way to construct a lower bound estimate for constrained resources, it still requires considerable computational effort, as illustrated previously. In this study, we propose a simple lower bound rule for the single-track train timetabling problem by recognizing the unique minimum headway requirements. Essentially, this lower bound rule estimates the minimum additional train delay for resolving the remaining crossing conflicts in a partial schedule, and it ignores the existing overtaking conflicts and new conflicts that could be generated in the future.\n\nTo calculate this lower bound, we first estimate the minimum additional delay for resolving a single crossing conflict, and then count the total additional delay for all the existing crossing conflicts in a partial schedule. As shown in plots (a) and (b) of Fig. 7, a conflict is said to be a crossing conflict when two trains run in opposite directions or an overtaking conflict when two trains run in the same direction. Mathematically, we can define a crossing conflict as a conflict if\n\\[ e_{i,j} \\geq s_{f,j}, e_{f,j} \\geq s_{i,j}, \\quad \\text{and} \\quad o(i) \\neq o(i'), \\] and an overtaking conflict as a conflict if\n\\[ e_{i,j} \\geq e_{f,j}, s_{f,j} \\geq s_{i,j}, \\quad \\text{and} \\quad o(i) = o(i'). \\] (25)\n\nFig. 8 shows a conflict between two trains \\( i \\) and \\( i' \\) at segment \\( j \\). If train \\( i \\) is scheduled first, then the resulting delay for train \\( i' \\) is \\( e_{i,j} + h_j - s_{i,j} \\), otherwise, scheduling train \\( i' \\) first delays train \\( i \\) with \\( e_{i,j} + h_j - s_{i,j} \\) time units. Hence, the following proposition is in order.\n\n**Proposition 1.** The minimal additional delay for resolving a crossing conflict at segment \\( j \\) is\n\\[ \\min(h_j + e_{i,j} - s_{f,j}, h_j + e_{f,j} - s_{i,j}) = h_j + \\min(e_{i,j} - s_{f,j}, e_{f,j} - s_{i,j}) \\geq h_j. \\] (27)\n\nIn fact, resolving a crossing conflict at an intermediate station should maintain minimum headways at the corresponding upstream and downstream segments, so the resulting delay is the sum of additional delays at two adjacent segments. For example, Fig. 9 shows two trains \\( i \\) and \\( i' \\) involved in a crossing conflict at station\n\n\n\n\nProposition 3. Consider trains $i$ and $i'$ starting at stations $u_0$ and $u_2$, respectively. Train $i$ travels from station $u_0$ to station $u_2$ and train $i'$ travels from $u_2$ to $u_0$. Segments $j$ and $j+1$ are two segments adjacent to stations $u$. Formally, we have the following proposition.\n\nProposition 2. Consider trains $i$ and $i'$ running from $u_0$ to $u_2$ and from $u_2$ to $u_0$, respectively, and they have no required dwell times between stations $u_0$ and $u_2$. If they have to meet at an intermediate station, the minimal additional delay for resolving a crossing conflict at any intermediate station between stations $u_0$ and $u_2$ is $g + h$, where $g = \\min_u g_u$ and $h = \\min_j h_j$.\n\nProof. Suppose we resolve a crossing conflict between trains $i$ and $i'$ at station $u$. If train $i'$ passes through station $u$ first, then train $i$ is delayed by at least $g_u + h_{j+1}$ time units, but if train $i$ passes through station $u$ first, then train $i'$ is delayed $g_u + h_j$ time units. Since the exact intermediate station for trains to meet is generally unknown, at least $g + h$ time units of delays are required to resolve a crossing conflict at any intermediate station.\n\nConsider Fig. 9(b) and (c), we have two parts of the additional delay at station $u$: part I is the headway between the arrival times of the two trains at station $u$, and part II is the headway between the departure times of the two trains. Since the departure time of the second train is only constrained by the minimum headway, the $h$ time units in the lower bound rule are, in fact, an accurate estimate for the delay associated with part II. In contrast, the arrival times of these two trains at station $u$ are determined by their previous path trajectories separately, so the first train might arrive at station $u$ much earlier than the second train. In this case, the minimum headway of $g$ time units might significantly underestimate the actual delay in part I. On the other hand, the actual delay in part I at station $u$ generally should not be greater than the free running time of downstream segment $j + 1$, otherwise it could be advantageous to change the train meeting station.\n\nIf no headway constraint is imposed on consecutive train arrival times at stations, it is easy to verify that the minimal additional delay for resolving a crossing conflict at an intermediate siding is $2h$ by replacing $g$ with $h$. To determine if two trains have to meet at one of the intermediate stations, we can estimate the possible meeting region based on feasible dwell time windows specified for two trains. The related proposition is given as follows.\n\nProposition 3. Consider trains $i$ and $i'$ starting at stations $u_0$ and $u_2$, respectively. Train $i$ travels from station $u_0$ to station $u_2$ and train $i'$ travels from $u_2$ to $u_0$. Suppose that at least one intermediate station exists between the stations, and that they have no required dwell times between stations $u_0$ and $u_2$. If $e_{i,j_1} \\geq s_{i,j_1} + d_{i,j_1}$ and $e_{i,j_2} \\geq s_{i,j_2} + d_{i,j_2}$, then the minimal additional delay for resolving the crossing conflict between trains $i$ and $i'$ is $g + h$.\n\nProof. If $e_{i,j_1} \\geq s_{i,j_1} + d_{i,j_1}$ and $e_{i,j_2} \\geq s_{i,j_2} + d_{i,j_2}$, then $e_{i,j_1} \\geq s_{i,j_1}$ and $e_{i,j_2} \\", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " – (2) backlit flashing linear high-intensity LED lights\n - Taillamp Lighting Solution – Halogen base lamps and (2) integrated hemispheric lighthead white LED marker lights.\n - Rear Lighting Solution – (2) backlit flashing, linear high-intensity LED lights (mounted inside liftgate glass) and (2) backlit flashing, linear high-intensity LED lights (mounted inside the liftgate lip)\n - Front Console Mounting Plate\n - Rear Console Plate\n - Hidden Door Lock Plungers\n - Control System – CenCom controller, control head, and wire\n - 100-watt Siren/Speaker – Includes wire\n - Wire Harness – (2) light connectors that supports up to (6) LED lights each (engine compartment), (2) grilled LED light connectors, (1) 10-amp siren/speaker circuit (engine to cargo area)\n - Whelen CenCom relay center/siren/amp with Traffic Advisor\n - Light controller/relay/CenCom wiring (wiring Harness) with additional input/output pigtails\n - High-current pigtail\n - Whelen specific WECAN cable connects CenCom to control head\n - Pre-wiring for grille LED lights, siren and speaker\n - Overlay wiring harness, grille LED lights, siren and speaker wiring, and control power harness\n\nADDITIONS OR DEVIATIONS FROM THESE SPECIFICATIONS MUST BE NOTED ON THE BID DOCUMENTS.\n**ATTACHMENT B**\n\n**PROPOSAL COVER SHEET**\n\nThis cover sheet must be placed on the very top of your proposal.\n\n**Bid Title:** Four (4) 2022 Police Utility Vehicles \nFord Explorer Interceptor or Chevrolet Tahoe PPV\n\n**Bid Due Date & Time:**\n\nWe have received all documents related to the above referenced project. We have examined all documents and have had the opportunity to submit questions for clarification. We hereby propose to furnish vehicles per the specifications as follows:\n\n
\n\n
\n
Year, Make & Model of Proposed Vehicle(s)
\n
Total Lump Sum Price of Vehicle(s)
\n
\n\n\n
\n
\n
• Including vehicle prep & delivery
\n
\n
\n
\n
• Tax Exempt – Do not include tax
\n
\n\n
\n\n| Estimated Delivery Date: |\n\n
\n\n
\n
Company Name:
\n
\n\n
\n\n
\n\n
\n
Address:
\n
\n\n
\n\n
\n\n
\n
Federal Identification Number:
\n
\n\n
\n\nBy:________________________________________________ \n ____________________________ (Authorized Signature) (Date)\n\nTitle:__________________________________________________________\nATTACHMENT C\n\nNON-COLLUSION CERTIFICATE\n\nI HEREBY CERTIFY I am the ____________________________________________________\n\n(Title)\n\nand the duly authorized representative of the firm of __________________________________\n\nwhose address is________________________________________________________________\n\nAND THAT NEITHER I nor, to the best of my knowledge, information and belief, the above\nfirm nor any of its other representatives I here represent have:\n\n(a) Agreed, conspired, connived or colluded to produce a deceptive show of\ncompetition in the compilation of the bid or offer being submitted herewith;\n\n(b) Not in any manner, directly or indirectly, entered into any agreement, participated\nin any collusion to fix the bid price or price proposal of the bidder or offeror\nherein or any competitor, or competitive bidding in connection with the Contract\nfor which the within bid or offer is submitted; and that no member of the County\nCommission of Jefferson County, West Virginia, administrative or supervisory\npersonnel or other employees of Jefferson County have any interest in the bidding\ncompany except as follows: (complete if applicable)\n\n______________________________________________________________________________\n\n______________________________________________________________________________\n\n______________________________________________________________________________\n\nI solemnly affirm under the penalties of perjury that the contents are true to the best of my\nknowledge, information, and belief.\n\nSignature: ______________________ Printed or Typed Name: ________________________\n\nDate: ______________________<|endoftext|>### Document Information\n\n### Version History\n\n
\n\n
\n
Version
\n
Date
\n
Author
\n
Reviewer
\n
\n\n\n
\n
1621
\n
10/26/16
\n
Editha Dura
\n
Roel Sinadjan
\n
\n
\n
1622/1623
\n
11/21/16
\n
Editha Dura
\n
Roel Sinadjan
\n
\n
\n
1624
\n
12/8/16
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1625
\n
12/20/16
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1626
\n
01/13/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1701
\n
01/26/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1702
\n
01/31/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1703
\n
02/14/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1704
\n
02/28/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1705
\n
03/15/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1706
\n
03/24/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1707/1708
\n
04/24/17
\n
Mia Ladoroz
\n
Roel Sinadjan
\n
\n
\n
1709/1710
\n
05/23/17
\n
Editha Dura
\n
Roel Sinadjan
\n
\n
\n
1711/1712
\n
06/21/17
\n
Editha Dura
\n
Mia Ladoroz/Roel Sinadjan
\n
\n
\n
1713/1715
\n
07/18/17
\n
Editha Dura
\n
Mia Ladoroz/Roel Sinadjan
\n
\n
\n
1716-1717
\n
08/15/17
\n
Editha Dura
\n
Mia Ladoroz/Roel Sinadjan
\n
\n
\n
1718/1719
\n
09/27/17
\n
Editha Dura
\n
Mia Ladoroz/Roel Sinadjan
\n
\n
\n
1720/1721
\n
10/11/17
\n
Editha Dura
\n
Roel Sinadjan
\n
\n
\n
1722/1723
\n
12/05/17
\n
Precious Mae Cenia
\n
Roel Sinadjan
\n
\n
\n
1724/1801
\n
01/03/18
\n
Precious Mae Cenia
\n
Roel Sinadjan
\n
\n
\n
1802/1803
\n
02/10/18
\n
Precious Mae Cenia
\n
Roel Sinadjan
\n
\n
\n
1804/1805
\n
03/05/18
\n
Precious Mae Cenia
\n
Roel Sinadjan
\n
\n
\n
1806/1816
\n
", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "autics Commission's approach plan for the airport.\n\nSection 55. That § 50-10-7 be amended to read as follows:\n\n50-10-7. In the event that a political subdivision has adopted, or hereafter adopts, a general zoning ordinance regulating, among other things, the height of buildings, any airport zoning regulations adopted for the same area or portion thereof under this chapter, may be incorporated in and made a part of such general zoning regulations, and be administered and enforced in connection therewith, but such may not limit the effectiveness or scope of the regulations adopted under this chapter.\n\nSection 56. That § 50-10-8 be amended to read as follows:\n\n50-10-8. Any zoning or other regulations applicable to any area within which, according to an airport approach plan adopted by the commission, measures should be taken for the protection of airport approaches, including not only any airport zoning regulations adopted under this chapter but any zoning or other regulations dealing with the same or similar matters, that have been or may be adopted under authority other than that conferred by this chapter, shall be consistent with, and conform to, the commission's approach plan for such area, and. The regulations shall be amended from time to time as may be necessary to conform to any revision of the plan that may be made by the commission.\n\nSection 57. That § 50-10-9 be amended to read as follows:\n\n50-10-9. All airport zoning regulations adopted under this chapter may be reasonable, and none unreasonable. No regulation shall require the removal, lowering, or other change or alteration of any structure or tree not conforming to the regulations when adopted or amended, or otherwise interfere with the continuance of any nonconforming\nuse, except as provided in § 50-10-28.\n\nSection 58. That § 50-10-10 be amended to read as follows:\n\n50-10-10. Where advisable to facilitate the enforcement of zoning regulations adopted pursuant to this chapter, a system may be established for granting permits to establish or construct new structures and other uses and to replace existing structures and other uses or make substantial changes therein or substantial repairs thereof. In any event, before any nonconforming structure or tree may be replaced, substantially altered or repaired, rebuilt, allowed to grow higher, or replanted, a permit must be secured from the administrative agency authorized to administer and enforce the regulations, authorizing such replacement, change, or repair. No such permit may be granted that would allow the structure or tree in question to be made higher or become a greater hazard to air navigation than it was when the applicable regulation was adopted; and whenever, if the administrative agency determines that a nonconforming structure or tree has been abandoned or more than eighty percent physically deteriorated, or decayed, no permit may be granted that would allow said the structure or tree to exceed the applicable height limit or otherwise deviate from the zoning regulations. Except as indicated all applications for permits for replacement, change, or repair of nonconforming uses shall be granted.\n\nSection 59. That § 50-10-11 be amended to read as follows:\n\n50-10-11. Any person desiring to erect any structure, or to increase the height of any structure, or to permit the growth of any tree, or to otherwise use his the person's property, in violation of airport zoning regulations adopted under this chapter, may apply to the board of appeals, as provided in § 50-10-15, for a variance from the zoning regulations in question. Such variances A variance shall be allowed where if a literal application or enforcement of the regulations would result in practical difficulty or unnecessary hardship and the relief granted\nwould not be contrary to the public interest but would do substantial justice and be in accordance with the spirit of the regulations.\n\nSection 60. That § 50-10-13 be amended to read as follows:\n\n50-10-13. No airport zoning regulations shall be adopted, amended, or changed under this chapter except by action of the governing body of the political subdivision in question after a public hearing in relation thereto, at which parties in interest and citizens shall have an opportunity to be heard. Notice of the hearing shall be given at least fifteen days prior to the date of the hearing by publication of a notice of the time and place of holding the hearing in a legal newspaper or a newspaper of general circulation published in the political subdivision or subdivisions in which is located the airport hazard to be zoned, provided that, however, if there be no such newspaper, or newspaper published in the said subdivision or subdivisions, the notice shall be published in the nearest legal newspaper; or newspaper of general circulation.\n\nSection 61. That § 50-10-14 be amended to read as follows:\n\n50-10-14. The governing body of any political subdivision adopting airport zoning regulations under this chapter may delegate the duty of administering and enforcing the regulations to any administrative agency under its jurisdiction, but such administrative agency may not be or include any member of the board of appeals. The duties of the administrative agency shall include that of hearing and deciding all permits under § 50-10-10, but such agency may not have or exercise any of the powers delegated to the board of appeals.\n\nSection 62. That § 50-10-16 be amended to read as follows:\n\n50-10-16. The board established pursuant to § 50-10-15 shall adopt rules in accordance with the provisions of any ordinance adopted under this chapter. Meetings of the board shall be held\nat the call of the chairman chair and at such other times as the board may determine. The\nchairman chair, or in his the chair’s absence the acting chairman chair, may administer oaths and\ncompel the attendance of witnesses. All meetings of the board shall be public. The board shall\nkeep minutes of its proceedings, showing the vote of each member upon each question, or, if\nabsent or failing to vote, indicating such fact, and shall keep records of its examinations and\nother official actions, all of which. The minutes shall immediately be filed in the office of the\nboard and shall be are a public record.\n\nSection 63. That § 50-10-18 be amended to read as follows:\n\n50-10-18. An appeal pursuant to § 50-10-15 shall stay all proceedings in furtherance of the\naction appealed from, unless the agency from which the appeal is taken certifies to the board,\nafter the notice of appeal has been filed with it, that by reason of the facts stated in the certificate\na stay would, in its opinion, cause imminent peril to life or property. In such case, proceedings\nshall may not be stayed otherwise than by a restraining order which may be granted by the board\nor by a court of record on application on notice to the agency from which the appeal is taken and\non due cause shown.\n\nSection 64. That § 50-10-27 be amended to read as follows:\n\n50-10-27. In addition, either the political subdivision within which the property is located\nor the Aeronautics Commission commission may institute in any court of competent\njurisdiction, an action to prevent, restrain, correct, or abate any violation of this chapter, or of\nairport zoning regulations adopted under this chapter, or of any order or ruling made in\nconnection with their administration or enforcement; and the. The court shall adjudge to the\nplaintiff such relief, by way of injunction, which may be mandatory or otherwise, as may be\nproper under all the facts and circumstances of the case, in order fully to effectuate the purposes\nof this chapter and of the regulations adopted and orders and rulings made pursuant thereto.\nSection 65. That § 50-10-28 be amended to read as follows:\n\n50-10-28. In any case in which:\n\n(1) It is desired to remove, lower, or otherwise terminate a nonconforming use; or\n\n(2) The approach protection necessary according to the Aeronautics Commission's commission's airport approach plan cannot, because of constitutional limitations, be provided by airport zoning regulations under this chapter; or\n\n(3) It appears advisable that the necessary approach protection be provided by acquisition of property rights,\n\nthe political subdivision within which the property or nonconforming use is located, the political subdivision owning the airport or served by it, or the commission, shall acquire by purchase, grant, or condemnation in the manner provided by the law under which political subdivisions are authorized to acquire real property for public purposes, such an air right, easement, or other estate or interest in the property or nonconforming use in question as may be necessary to effectuate the purposes of this chapter.\n\nSection 66. That § 50-10-30 be repealed.\n\n50-10-30. If any provision of this chapter or the application thereof to any person or circumstances is held invalid, such invalidity shall not affect other provisions or applications of the chapter which can be given effect without the valid provision or application, and to this end the provisions of this chapter are declared to be severable.\n\nSection 67. That § 50-10-31 be repealed.\n\n50-10-31. This chapter shall be known and may be cited as the \"Model Airport Zoning Act.\"\n\nSection 68. That § 50-11-2 be amended to read as follows:\n\n50-11", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "9,332.00
\n
$70,361.00
\n
\n\n
\n\n* 0 mileage = EFT-24 is incomplete for that FY\n\nExport to Excel\n\n* N/A = not available\n\nMaine Department of Education\nHow Are Bus Approval Decisions Made? – First (1st) Priority\n\n• “Bus Replacement”\n – Emergency situation\n • An emergency situation occurs when a bus is damaged beyond economic repair due to:\n – accidents\n – fire\n – vandalism or\n – other [total] losses\n\nNote: Districts are responsible for school bus maintenance\nHow Are Bus Approval Decisions Made? – Second (2\\textsuperscript{nd}) Priority\n\n- “Addition to Fleet”\n - Unique situation\n - An “addition to fleet” situation occurs when a district needs buses to:\n - Transport handicapped students\n - Transport for a special purpose\n - Transport increased enrollment students\n - Replace contracted services (emergency)\n - Replace contracted services (planned)\n\nSource: CMR 05-071 Chapter 85\nHow Are Bus Approval Decisions Made? – Third (3\\textsuperscript{rd}) Priority\n\n- “Bus Replacement”\n - Age of the retiring bus\n- “Age as the primary consideration, tempered by both high and low mileage”\nMay Districts Buy A Bus Different From The Bus That Was Requested and Approved?\n\n- Bus approvals are based on the original bus request\n- Can SAUs change fiscal year of purchase?\n - No changes are permitted\n - Bus approvals are valid one (1) year\n - Approvals are not carried forward\n - If a district cannot purchase a bus during the fiscal year of a Department bus approval:\n - The district must cancel the approval\n - Failure to cancel a bus prevents redistribution of funds to other districts in need of buses\nBus approvals are based on the original bus request.\n\nCan SAUs change bus type: A, C, or D?\n- Requires Department approval before purchase\n- **Bus allocation will be reduced**\n - Change down: D to C or A; C to A\n - Total state bus approval allocation is reduced to the lower bus Type rate\n - Change up: A to C or D\n - Total state bus approval allocation is held at lower bus Type rate\nMay Districts Buy A Bus Different From The Bus That Was Requested and Approved? (cont.)\n\n- Bus approvals are based on the original bus request\n- Can SAUs change bus capacity?\n - Requires Department approval before purchase\n - Bus allocation will be reduced\n - Change from larger to smaller bus\n - Total allocation will be reduced to the max approval amount for the smaller bus\n - Change from smaller to larger bus\n - Total allocation will remain the same as the max approval amount for the smaller bus\nMay Districts Buy A Bus Different From The Bus That Was Requested and Approved? (cont.)\n\n- Bus approvals are based on the original bus request.\n- Can SAUs change bus purchase payment terms?\n - Requires Department approval before purchase.\n - Change from cash (1 year) to term (2 to 5 years).\n - District total allocation will remain the same.\n - Change from term to cash (1 year).\n - Bus allocation will be reduced.\n - Change term payment years.\n - Increase years, e.g. from 2 to 3: no reduction.\n - Decrease years, e.g. from 5 to 2: reduction.\nProgram Application Rounds\n\n• Round 1\n – Occurs annually\n – Applications open Nov. 1 and close Nov. 25\n – State approvals announced Dec. 30 to Jan. 15\n\n• Round 2\n – Depends on cancellations, may or may not occur\n – Opens after Round 1 approval announcement\n • All applications that did not make Round 1 approval are automatically moved to Round 2\n – No specific approval date (~March to Oct.)\n\nSource: CMR 05-071 Chapter 85\nProgram Reports\n\n• Bus Purchase Program reports\n – EFT-17 bus request\n – EFT-18 superintendent intent to purchase bus\n – EFT-19 bus cancellation\n – EFT-20 bus purchase\n\n• Annual transportation reports (July 1 through Oct. 15)\n – EFT-21 Transportation Safety and Training\n – EFT-24 Vehicle Mileage and Operations\n – EFM-43 OOD, SPED, Homeless and CTE\nProgram Subsidy Reminder\n\n- **Subsidy Amount**\n - ED 279 report, section 3 A, other allocations\n - Contact Maine DOE school finance\n- **Delayed district reports effect subsidy (ED 279)**\n - Bus *cancellation* report (EFT-19)\n - Delayed cancellation reports prevent redistribution of bus money to other districts\n - Bus *purchase* report (EFT-20)\n - Delayed reports lead to withheld subsidy\n- **Timely transportation reports are important**\n• Statutory Authority\n – “Authority to withhold state subsidy until reports are received. Notwithstanding any other provisions of law, if a school administrative unit has failed to file the reports by this Title in the format and within the time periods specified, the Commissioner may withhold state subsidy payments until these reports are received.”\n\n[20-A M.R.S. § 6801-A(2)]\nEPS Model Review Cycle\n\n- Statute requires EPS model review every 3 years\n - Transportation is in the FY 2019-20 group review\n- Maine DOE contracts the review with USM\n - CEPARE studies are for the Commissioner who may use the analysis to make recommendations for changes to funding of transportation operating\n - Funding formula changes do need approval of the Committee to move forward to the full Legislature for enactment\n- EPS website:\n http://www.maine.gov/education/data/eps/epsmenu.htm\n\n20-A M.R.S. § 15671\nP.L. 2005 Chapter 2 (LD 1)\nFrequently Asked Questions\n\n• **Q1:** How do I know if we received a bus approval?\n – Superintendent receives an email; approvals post on NEO Bus Approval Summaries screen\n\n• **Q2:** Does an approval roll over to the next FY?\n – No. Approvals are valid for 1 year\n\n• **Q3:** My application met the program requirement; why wasn’t my bus approved?\n – Being eligible does not guarantee an approval; about 1/3 to 1/2 of requests are approved; bus age, special needs transport, emergencies, and additions to fleet take precedence\n• Q4: Do the Maine school bus specifications include extra vehicle features?\n – No. The state specs provide basic safety features\n – Districts determine extras features for their driving conditions and negotiate feature costs\n\n• Q5: How does a district bid their school buses?\n – Districts may directly purchase buses from low bid vendors for each bus Type/capacity based on current Maine State School Bus Bid result\n – Per 20-A M.R.S. § 5402, districts bid their buses if they don’t use the state Type/capacity low bidder\nQ6: What is the Maine State School Bus Bid?\n- State Division of Procurement initiates a RFQ inviting vendors to submit quotes for school buses that meet the minimum state specifications.\n\nQ7: Can a district order a bus before the purchase FY?\n- Bus orders can be placed when the state bus approval is issued but possession must occur the year the bus is approved to purchase.\n- The bus order should identify the FY the district may take possession of the new bus.\n• Q8: Is it OK to change the payment term on my bus approval?\n – Yes and subsidy is reduced if payment years are reduced, e.g., 5 year term to 1 year cash\n• Q9: Is it OK to buy a different bus type or capacity than the bus that was approved?\n – Yes and subsidy is reduced if type or capacity are less than the approved type or capacity\n• Q10: How much subsidy will the district receive?\n – Transportation provides maximum bus approval amount; finance provides final subsidy calculation\nQ11: Is it OK to retire a different bus than the bus (VIN) that was submitted and approved on the original bus request (EFT-17)?\n\n- No. Bus approvals are based on the original bus request (EFT-17) retiring bus age and mileage.\n- However, the district may cancel the original request and approval then submit a new request (EFT-17) using a different bus (VIN).\n• Q12: When does a district take possession of a new approved school bus?\n – During the fiscal year the bus is approved to purchase\n\n• Q13: When does a district make the first payment on an approved school bus?\n – During the fiscal year the bus is approved to purchase\nFrequently Asked Questions (cont.)\n\n• Q14: When is a district required to report that they have purchased and taken possession of a new school bus?\n – After taking possession of the new bus, during the fiscal year the bus is approved to purchase, and no later than June 30 of the approved purchase fiscal year\n – Late EFT-20 School Bus Purchase Reports delay district subsidy per 20-A M.R.S. § 6801-A(2)\n• Q15", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": " not univocal, as critical studies of waterfront regeneration have shown.\n\nMoreover, an unequal distribution of power between groups challenges the task of defining group boundaries. There is an unstated assumption, in many of the studies conducted on the port-city interface, that the authority and ability of the various stakeholders to promote plans are not uniform. The Port Authorities are often seen as strong, while the local government is usually considered much weaker in its ability to define and implement its spatial goals. Yet, there are examples of institutional arrangements that can compensate for uneven political capital, such as stakeholders’ representation in management boards, designated departments for port-city cooperation and foothold in the planning processes or a mutual ability to influence it.\n\nThese could also support two more of Ostrom’s principles: to provide low-cost means for dispute resolution among participants or between participants and the regulator, and to ensure that those affected by the rules can participate in modifying them. To implement the latter principle, not only representatives of city governments and ports, but also the local population must be allowed to participate. Implementation of effective mechanisms for public participation, albeit their imperfections, would also address an additional principle, which refers to a system which would monitor the behavior of members. The monitoring would be carried out by participating members or by an external regulator.\n\nThe fifth principle for robust management suggests matching the rules governing the use of common goods to local needs and conditions. This principle draws attention to the question of scale of governance and relates to the levels of decentralization of decision-making in each country. While most spatial decisions related to large\ninfrastructure are taken at a national level (see Marshall, 2013). Ostrom’s model offers a local resolution approach. It requires the scaling-down of decision-making authority and planning to the city, or at least to the regional level.\n\nAdjusting the level of governance to local conditions also supports the six principle, which calls to build responsibility for governing the common resource (appropriation, provision, monitoring, enforcement, conflict-resolution and governance activities) in nested tiers from the lowest level up to the entire interconnected system. “Gray zones”, or “border zones”, such as between the core area of port activity and the city, challenge current institutional-regulatory frameworks of planning which struggle to address conflicts and that will always favor, maybe unrealistically, conflict-free, empty zones. They also reflect the inherent tension between different levels of planning jurisdiction and their focus of attention. Such mismatch was observed and conceptualized as the lack of fit between institutions and socio-ecological systems (Folke et al., 2007). In such cases, horizontal forms of interaction prevail and each decision-making institution has its own perception of how such spaces should be occupied and managed. Usually, the result is that national strategic or economic interests override local planning goals.\n\nOstrom’s remaining recommendations include the use of graduated sanctions for rule violators and the safeguarding, by external government authorities, of rule-making rights for participants. In order to design such mechanisms, there will be a need to define what it means to violate the rules of using the coastal commons. Violations may include unauthorized use of the land, non-compliance with environmental standards, or even a lack of cooperation from stakeholders.\n\nThe tensions between different levels of planning, between the practical and the symbolic, between ownership and use, and the interests of the various stakeholders are not an exclusive experience of port cities. All cities are characterized by a wide range of internal institutions whose conflicting objectives, values, and activities play a role in urban development (Wilson, 1987). Urban sociologists have also examined the phenomenon of physical or perceptually constructed boundaries within cities. The importance of this topic lies in the observation that the organization of and control over space affected by competing interests and governance, has traditionally produced social inequalities and exclusion, giving rise to questions of control and sovereignty (Agnew, 2013). Yet, not all efforts are in vain; several urban regeneration projects, for example, are considered new spaces of “collaborative commons” (Clemente et al., 2015, p. 113).\n\nOn a much larger scale, the ICZM protocol, in its current form, can serve only as a model. As the highest level framework intended to safeguard the coastal commons, it presents many achievements. However, the institutional and administrative fragmentation that characterizes the management of coastal areas in many countries (Portman et al., 2012) poses a significant challenge to its implementation. Port cities, with their many tensions and limitations to cooperation, provide a practical example of this fragmentation. Currently, the most widespread administrative model for ports is the landlord port model, advanced by the World Bank, in which governments establish Port Authorities to manage port activities. Yet that model is based on the paradigm that ports exist as separate, detached entities from cities. The picture emerging suggests that there is a need for a “landlord” in this spatial interface of ports and cities. In an interview with a municipality representative in Volos (Greece) he compellingly noted\nthat there is a common feeling that the port is “a city within a city”. There may be, however, various institutional-regulatory arrangements that can help to blur such boundaries, and accelerate the inching-back of the (urban) coastal commons.\n\n**Concluding remarks**\n\nIt is not easy to think about port territory along the shoreline and inland as the commons, because these are massive, inaccessible and strategically important infrastructure at national level. But in a world where “natural” common pool resources are becoming increasingly rare and where a significant portion of the coast is built-up, it is necessary to expand the notion of urban commons also to the “gray areas”, post-industrial zones which hold the potential to become mixed-use, public spaces.\n\nThis study has demonstrated how land-based arrangements, primarily the four which we outlined in the results section, can be critical in understanding the sources of planning-related conflicts and potential solutions. Notably, the classification of port land as public domain or public land in the law of each country studied here does not bring with it any guarantee of “open access”, a “right of access” or the ability of representatives of the public to make a significant impact on the spatial design of the area. Similarity, waterfront regeneration projects sometimes exhibit a port-city resolution to some extent, creating new urban commons, while a critical look on this space may question its quality or overall contribution to different publics.\n\nThe common experiences found in the contrasting coastal cities cited in this study lead to a suggestion that – through combined strategies involving lessons from Ostrom’s design principles for managing resilient commons – ports and the cities that host them can find a new harmony and synergy which will strengthen local economies and quality of life. Since most previous studies of the port-city interface have focused on mapping and analyzing cases of conflict, it is time to take the examination one step further by focusing on mechanisms for greater spatial cooperation.\n\n**Note**\n\n1. For a comprehensive, updated review in English of port governance in Greece, see Pallis and George (2017).\n\n**Acknowledgments**\n\nThis article was written as part of the research project on the regulatory-institutional implementation gaps in the ICZM Protocol, entitled “Mare Nostrum”, which was funded by ENPI CBC MSB Grant Agreement I-A/1.3/093 during the years 2012-2016. The time, data, knowledge and experience provided by the interviewees in the participating countries are greatly appreciated. Personal details are omitted to respect confidentiality. The author is grateful to Rachelle Alterman, the leading researcher for her significant contribution to this study as well as to the Mare-Nostrum project team. The paper benefited from suggestions made by Shaul Horev, Sarai B. Aharoni, and Dorit Garfunkel. Finally, the author expresses her gratitude to Alon Tal for his valuable feedback on an earlier draft of the manuscript, as well as for two thorough, constructive anonymous reviews. Any errors reside solely with the author.\nDisclosure statement\n\nNo potential conflict of interest was reported by the author.\n\nFunding\n\nThis work was supported by the ENPI CBC MSB; [I-A/1.3/093].\n\nORCID\n\nNa’ama Teschner http://orcid.org/0000-0003-4309-1056\n\nReferences\n\n\nHabermas, Jurgen. 1962. *The Structural Transformation of the Public Sphere*. Cambridge. (1989 translation to English)<|endoftext|>DECARBONIZATION OF HEAVY-DUTY TRANSPORT IN NORTH AMERICA:\nMAKING CLIMATE JUSTICE CENTRAL TO THE PROCESS\n\nMULTI-STATE MEDIUM- AND HEAVY-DUTY ZERO-EMISSION VEHICLE ACTION PLAN CONSULTATION\n\nBy the David Suzuki Foundation and Équiterre\nSpring 2022\nThe David Suzuki Foundation (DavidSuzuki.org | @DavidSuzukiFdn) is a leading Canadian environmental non-profit organization, founded in 1990. We operate in English and French, with offices in Vancouver, Toronto and Montreal. We collaborate with all people in Canada, including Indigenous leadership and communities, governments, businesses and individuals to create a sustainable Canada through scientific research, traditional ecological knowledge, communications and public engagement, and innovative policy and legal solutions. Our mission is to protect nature’s diversity and the well-being of all life, now and for the future. We envision a day where we all act on the understanding that we are one with nature.\n\nÉquiterre seeks to make the necessary collective transitions towards an equitable and environmentally sound future more tangible, accessible and inspiring. Deeply concerned about climate change, Équiterre has developed significant expertise in public policy aimed at reducing greenhouse gas (GHG) emissions over the years. Through demonstration, education, awareness-raising, research, coaching and mobilization projects, Équiterre rallies", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-transportation", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-transportation/part-00-00000.npy", "text": "-win for everyone\n- Even while offering this project, UP attempted to meet privately with downtown affected businesses intending to \"buy them off\" and this \"divide and conquer\" tactic was dropped when it became obvious that it wasn’t working\n- The UP had attempted to use scare tactics on their own employees telling them that their retirement funds would be jeopardized if the UP was forced to fund such an effort\n- Even after proposing the depressed trainway as their alternative, the UP continues to push for overpasses through downtown privately in meeting at the State Capitol with legislators\n\nCharles McNeely said that this is not a partnership or a \"win-win\". This is gamesmanship at its highest level, and what concerns me and this community is that it appears the deck is stacked here; that an outcome favorable to the Railroad is already being fashioned; the deal is done and we, the City of Reno, are parties to a charade.\n\nCharles McNeely said that he has alerted Reno’s delegation in Washington, D.C., the Governor as well as the Council on Environmental Quality (CEQ), which has regulatory oversight of the STB’s environmental decisions, to review the STB’s procedures in this study as well as why an EIS was going to be prepared for the Conrail Merger.\nIntroduction / Review Agenda\n\nKay Wilson introduced the participants and asked the members of the Task Force and general public to introduce themselves. The Surface Transportation Board (STB) was not present at this Task Force meeting.\n\nCharles McNeeley thanked the members of the Task Force to have an opportunity to speak and applauded the members for their participation thus far but questioned the objectivity and fairness of the environmental process associated with the Environmental Mitigation Study (EMS). He continued to state that he thought the STB and its consultants would take a real look at the impacts of the merger and its the city’s position to support the merger but object to the unwillingness of the Union Pacific Railroad (UP) to address the impacts of the Merger.\n\nHe said the process was rampant with bias towards the railroad and that the STB has preconceived opinions of what should be done before the EMS was ever completed. He sited an example of unfair treatment as the STB’s decision to prepare an EIS for the Conrail\nSurface Transportation Board\nTask Force Meeting\nSummary of Meeting Notes\n\nSession: Task Force #7\n\nDate: July 9, 1997\n\nLocation: City of Reno\n290 South Center Street\nRoom 211\n1:00 - 3:50 pm\n\nSubject: Union Pacific/Southern Pacific Railroad Merger\n\nEnvironmental Mitigation Study - Task Force Meeting\n\nAttendees: STB Representatives\nDave Mansen - De Leuw, Cather & Company\nKay Wilson - Public Affairs Management\nNasser Ashrafi - De Leuw, Cather & Company\n\nTask Force Members\nMerri Belaustegui - City of Reno, City Manager’s Office\nSteve Varela - City of Reno, City Engineer\nMark Demuth - City of Reno, Environmental Team\nLarry Farr - City of Reno, Emergency Services\nTom Robinson - City of Reno, Emergency Services (alternate)\nSteve Bradhurst - Reno Citizens, General Interest\nRichard Vitali - Reno Citizens, Riverbanks Homeowners (absent)\nPaula Berkley - Native American Representative (absent)\nBill Osgood - Business Community Representative\nBob Burns - NFRA (absent)\nBob Webb - Washoe County (absent)\nJack Lorbeer - Regional Transportation Commission (alternate)\nTim Crowley - State of Nevada Representative\nCraig Wesner - Nevada Public Service Commission (alternate)\nRobert Sellman - City of Sparks (alternate)\nMichael Hemmer - Union Pacific Railroad\nRon Scolaro - Amtrak Representative (absent)\nKen Lynn - State Economic Interest (absent)\nScott Hutcherson - Warehousing & Distribution (alternate)\n\nTask Force Alternates\nColleen Henderson - City of Reno, Environmental Team\nMichael Halley - City of Reno, City Manager’s Office\nTom Gribbin - City of Reno, Engineering Team\nNancy Burkhart read into the record a letter from Scott Beeman, Circus Circus indicating he agreed that failure to provide advance review of data prohibited a meaningful task force meeting.\n\nSeeing no further comments, the Task Force meeting was adjourned by Kay Wilson.\nwas looking at future conditions both with and without the merger, holding the year 2000 as a traffic constant. Mark stated that year 2000 is not baseline.\n\nDave Mansen said they would not be attributing increase in traffic from 1995 to 2000 to the UP. Demuth responded that there would be a wider number if 1995 baseline data was used.\n\nMark Demuth asked DCCo to explain how a day/night mix of trains was determined when UP has indicated that it is impossible to formally schedule trains. GUI indicated that it was based on the train traffic during the monitoring week, and was a 53/47 split. Mark indicated that there was no purpose in going on with any further questions DCCo will not respond to my questions pertaining to baseline conditions and appropriate methodologies.\n\nCraig Wesner asked if a bicycle was considered a vehicle. GUI said yes.\n\nHarold McNulty indicated that the ICC used to break down accident data by who hit who, although the STB no longer maintains these statistics.\n\nMember of the Public Has actual Reno accident data been entered into the record? Dave indicated yes.\n\nHarold McNulty asked Mark Demuth to write a letter to the STB outlining what methodology he thinks should be used in the analysis of traffic delay and train/vehicle accident analysis. Mark indicated that a letter would be forthcoming.\n\nSeeing no further comments on item 4, Kay Wilson moved on to item 5.\n\n**General Discussion/Public Comment**\n\nPublic - What does upgraded gate systems mean. Dave indicated that it refers to advanced circuitry.\n\nBob Webb asked that hazardous materials shipping be addressed in the mitigation study. Dave indicated that it would be.\n\nBill Osgood asked when and where the upcoming directional horn test would be conducted. Most people thought it was on the 17th.\n\nMark Demuth provided the STB with a written submittal containing complete information on population growth for the City of Reno and Washoe County, and indicated that a 1.8% annual growth is not excessive.\n\nPublic - what is the current number of trains passing through the City of Reno now. Dave indicated that the current number is an average of 10/day. It was an average of 20 per day during the emergency detour.\nKay Wilson said we can clarify what our thinking is but we can’t say what is reasonable at this point.\n\nHarold McNulty said \"Regardless of all the science we put into this, it [the mitigation plan] comes down to judgment”.\n\nBruce MacKay said underpasses may mitigate Ralston and Keystone but does nothing for noise and safety on Center, Sierra, Virginia Streets. SEA needs to balance the whole area and can’t just cherry pick a quick fix.\n\nNancy Burkhart asked for the STB/DCCo to define what feasible, responsible and reasonable mitigation means. It must be different than our interpretation. We need to know what feasible means before we can go any further. Dave indicated that the final decision on what type of mitigation is feasible rests with the STB. Dave also stated that maybe we can take a look at past STB actions to get a feel for what feasible is, and report back to the Task Force. Harold McNulty noted that SEA’s recommendations to the STB may or may not be implemented by the board. It is entirely up to their discretion. Harold also stated that reasonable means that all of the fact have been balanced to come to a workable solution.\n\nRich Vitali asked how the mitigation study would be structured. Dave indicated that all options will be laid out and evaluated. Rich said that he is offended that McNulty feels that all of the Task Force comments are criticisms and that these are critical issues to the downtown.\n\nSeeing no further comments on Item 3, Kay Wilson move on to Item 4.\n\n**Train/Vehicle Accident Data**\n\nGui Sheerin provided another handout to the Task Force members and began his presentation on train /vehicle accident data.\n\nMark Demuth asked Gui to define what an accident is. Gui stated that an accident is a train/vehicle collision, and does not include pedestrians or suicide attempts, nor does it account for injury or death.\n\nGui Sheerin continued his presentation and discussed accident rates for the same conditions and scenarios as outlined in the traffic delay presentation. Pre merger accidents were documented at 1.26 per year, with post merger accidents projected to be 1.7 accidents per year. Only the depressed trainway mitigation option reduced train/vehicle accidents to less than pre merger levels.\n\nMark Demuth asked how baseline traffic numbers could be 1995 traffic volumes and train numbers based on post merger conditions. This would result in a smaller number of accidents that would be expected to occur based on a wider spread of data. Dave indicated that DCCo\nSurface Transportation Board \nTask Force Meeting \nSummary of Meeting Notes\n\nvs. outlying grade separations. Dave indicated that every solution has its own set of problems.\n\nHarold McNulty indicated that most of the input to date from the Task Force has been criticism, and not focused on constructive ideas, which is the purpose of the Task Force. Merri followed up by saying that we would like to see an evaluation of the depressed trainway, a constructive idea.\n\nMark Demuth stated that he can’t believe that Sutro is included as a possible mitigation option, and that intersection had never been previously discussed.\n\nDave Mansen said feasible vs. advisable is a consideration.\n\nFrank Napier斯基 indicated that he is on the opposite side of the coin as Mark and that the traffic delay analysis should be based on historical train traffic numbers (3", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " populate sectors with a high demand for manual or unskilled workers and with low entry barriers, such as cleaning or catering (Engelen 2001; Rath 2002). This indicates that there is a growing, and ethnically specific, divide between the highly educated, well-paid knowledge workers in Western societies and the workers that are concentrated in the lower tiers of the labour market or even more seriously marginalized. These developments are also gender specific, as the changing opportunity structure produces different outcomes for men and for women.\n\nThese crucial trends also have their own spatial dimension. It is argued that capital today is more mobile, and that cities are even more central to the emerging economy, than they were in the Industrial Age (Castells 1996; Webster 2001). Gateway cities like Miami, New York, Vancouver, Sydney or Amsterdam have become nodes in national and international networks, bridging migrant communities and linking businesses and consumers from all over the world. High-skilled professionals, low-skilled job seekers, students and holiday travellers alike are gravitating there. They are part and parcel of the rapid transformation of these cities from sites of industrial production into spaces of information circulation and consumption. Kwak and Hiebert (this volume) show how these multifarious categories of migration are intricately linked together: the rise of the international education industry initially involves the (officially temporary) migration of students, but it also generates new forms of international mobility, including visits by family members and friends to the international students and the arrival of business people who cater to the needs of these categories.\nCity authorities show interest in these developments, if only because they believe that the students of today are the international job seekers or business investors of tomorrow.\n\nThese converging processes affect the urban social fabric in profound ways. They alter the opportunity structures, shape and reshape forms of inclusion and exclusion, and add new dimensions to the already existing economic, social and cultural diversity. Sociologists and geographers like Castells, Fainstein and Sassen have captured this socioeconomic and spatial bifurcation, arguing that the dual city is at once globally connected and locally disconnected (Castells 1989; Fainstein et al. 1992; Mollenkopf and Castells 1991; Sassen 1991). This social division inhibits urban socioeconomic development and undermines the quality of urban life. Clearly, those who fail educationally and are excluded from the knowledge economy, yet remain stuck in city areas in close proximity to the rich and affluent, become a matter of serious political and social concern. In these circumstances, the rise of urban tourism, and the new opportunities it creates in the service industries, is more than welcome.\n\nCommodification of culture and revaluation of urban space\n\nHere we enter the realm of studies on the emerging knowledge economy and the role of cities as places of information circulation, creativity and consumption. The growth of the urban tourism industry is intricately tied up with the rapid transformation of the manufacturing economy to an information economy and beyond. Deindustrialization resulted in a need for localities to differentiate themselves, in order to attract a share of the spatially mobile capital. In large cities in particular, authorities ranging from local governments to marketing consortia now strive to present their localities as attractive places for potential investors, employers, inhabitants and tourists (Kearns and Philo 1993).\n\nUrban tourism is more than just a collection of tourist facilities. It is the consumption of signs, symbols and spectacle, the experiencing of aesthetically spaces of entertainment and pleasure (Featherstone 1991; Kearns and Philo 1993; Lash and Urry 1994; Selby 2004). The manipulation of place images and the projection of a high quality of life reflect a revaluation of urban space at the local level in response to global processes. The deliberate creation of an attractive place product and place image, together with the material processes that produce the urban landscape, spawns a diversity of spatial narratives (Duncan and Duncan 1988; Zukin 1991, 1995). The existence of spatial narratives and their contested nature are central to debates on the utilization of tourism, place marketing and heritage in socioeconomic development.\n\nBy pursuing urban imaging strategies, cities seek to attract mobile capital, tourists and immigrants (so long as these fit into the prescribed urban policy goals). As Roche (1994, 2000) has noted, the principal aims\nof imaging strategies, or re-imaging in the case of older urban centres, are to:\n\n- attract visitor expenditure\n- generate employment in tourism and other industries\n- foster positive images for potential investors in the region, often by ‘re-imaging’ previous negative perceptions\n- provide an urban environment that will attract and retain the interest of professionals and white-collar workers, particularly in ‘clean’ service industries such as tourism and communications.\n\nThese strategies, in short, are employed to attract mobile capital and people.\n\nUrban imaging processes are typically characterized by some or all of the following activities:\n\n- creation of a critical mass of visitor attractions and facilities, including new buildings and prestige centres (casinos, event and convention centres, stadiums, refurbished waterfronts);\n- the hosting of hallmark events;\n- development of urban tourism strategies, policies and campaigns, often associated with new or renewed organization and development of city marketing;\n- development of leisure and cultural services and projects to support the marketing and tourism effort (e.g. the creation or renewal of museums and art galleries and the hosting of art festivals, often as part of a comprehensive cultural tourism strategy for a region or city);\n- deliberate commodification and rebranding of urban space to identify ‘new’ places for leisure consumption (e.g. the promotion of nightlife, restaurant or ethnic districts).\n\nWhilst urban imaging processes help to explain why some areas or activities have become so popular, we also need to explore how these patterns of consumption are shaped. Why have deprived neighbourhoods in cities like Amsterdam, Berlin, Birmingham, Brussels and Lisbon turned into magnets attracting numerous day-trippers who want to become absorbed into an exotic world (cf. Collins and Castillo 1998)? Why has the mainstream diet in countries like the Netherlands, Germany and England, which centred around bland meat, potatoes and standard vegetables, expanded to embrace tacos, Bombay duck, chicken tikka masala, döner kebab, rijsttafel and babi pangang (Halter 2000; Miller et al. 1998; Narayan 1995; Ram et al. 2000; Tsu 1999)? What cultural processes support the growing popularity of ‘ethnically’ diverse attractions by persuading people to appreciate new and different tastes?\nThese processes, to be sure, do not just arise from the manipulations of local government officials. Zukin (1991; and see also Valle and Torres 2000) has argued that a critical infrastructure of individuals must exist who are all connected in some way with cultural production and appreciation and who are capable of influencing public taste. This critical infrastructure contains a broad spectrum of knowledge workers that design cultural production and consumption; they include connoisseurs, cultural mediators and marketing bureaus as well as business associations, tourist boards and parts of national and local government. Whatever the intentions behind it, the critical infrastructure influences the popularity of particular cultural products. It identifies which products are ‘relevant’ and makes statements concerning their real or alleged authenticity and the significance of consuming them. It thereby helps to shape the multicultural urban landscape. The messages from this critical infrastructure are not simply ‘free-floating’, but are conveyed through the internet or more conventional means of communication, through the behaviour of trendsetters or other people from the cultural vanguard, through the programmes of specific educational institutes, or through the ready availability of easy-to-consume products and services. As Zukin (1991) points out, shifting preferences have an impact on the nature of production; they ultimately bestow opportunities on some groups and their areas of the city, while simultaneously making other groups and areas largely invisible to ‘the people who matter’. How this critical infrastructure functions, and how immigrant producers of tourist attractions, as well as their consumers, fit into this process, are a matter for further research. The chapters in this volume by Fainstein and Powers and by Marques and Lima da Costa provide good evidence of the operation of such infrastructures.\n\nZoned ethnicity\n\nIdentifiable ethnic areas within cities are now often used as an attraction for short- and long-term visitors, thus contributing to the identities of the cities themselves, of those who live in the areas and of those who visit. As observed above, few researchers have studied ethnic enclaves, or the ‘zoned ethnicity’ of some parts of cities, in terms of their tourist dimensions, even though many of them are already notable urban attractions (Abrahamson 1995; Timothy 2002).\n\nLet’s return to the case of San Francisco’s Chinatown. The original Chinatown was widely considered a slum, and had a bad reputation in white American society as the dumping ground for an undesirable immigrant group. However, as Timothy (2002; cf. Anderson 1995; Lin 1998; Wong 1995) has observed, this very image paradoxically encouraged tourism development. To non-Chinese people in the early twentieth century, Chinatown was a quaint, mysterious part of town, a ‘foreign colony’ in their midst. Advertisements promised that white tourists visiting\nthe district would experience the ‘sounds, the sights, and the smells of Canton’. They could imagine themselves in ‘some hoary Mongolian city in the distant land of Cathay’, and could ‘wander in the midst of the Orient’ without leaving America, seeing throngs of people", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " expanded venues, your event is sure to be even more incredible.\n\n• 200,000+ square feet of flexible meeting space\n• 38,000+ square-foot ballrooms\n• Premium dining options\n\nContact us to learn more:\n› KalahariMeetings.com\n› groups@kalahariresorts.com\n› 855.411.4605\nAlthough some see meals as just something you do between waterslide runs, part of your one world experience at Kalahari Resorts & Conventions will be world-class dining. Every location features restaurants to satisfy every taste, from steakhouses to ice cream shops. You’ll never have to eat in the same spot twice, but you just might want to.\nADVENTURERS CLUB\n\nThere’s no shortage of fun, engaging activities for the kids at Kalahari Adventurers Club. They can go on hikes, do finger painting, crafts, games and scavenger hunts, and we even have a family of characters! Go on your own adventure with Kenya and his girlfriend, Kya, as they splash the days away with their pals Lou and Benny.\n\nKenya is an elephant from the Serengeti. He loves to play and splash around with his friends and his girlfriend, Kya.\n\nKya is the elephant with the brightest smile. In fact, her name is Swahili for “the light of a diamond.” She’s been a part of the Kalahari family since meeting Kenya, Luganda and Benin 12 years ago.\n\nLou is a lion who loves nothing more than hanging out and having fun with his best friends.\n\nBenny is a monkey who loves to joke around and make his friends smile. If you see Benny at Kalahari, give him a high-five, a hug or a joke, and he will be your friend forever.\nAnother important part of your adventure is making time to relax. When you want to slow down and indulge in “you” time, our first-class spa offers services to relax and rejuvenate the mind, body and spirit. The exotic ambiance allows you to slip into a relaxing experience that feels a world away. Our spa offers body treatments, luxurious massages, skin care, nail care and a salon.\nForgot your swimsuit? No problem — we have premium designer swimwear available, as well as towels, T-shirts and any other amenity you might need during your stay. We also have authentic art, trinkets and clothing from Africa. Bring something home to remember your adventure forever.\nOur dream is still growing, and we're now bringing the thrills of Africa to you in 4 different locations. Step into an experience that feels A World Away™, now in Wisconsin, Ohio, Pennsylvania and Texas.<|endoftext|>Bittersweet ‘birthday staycay’ but he’s proud of S’pore’s response\n\nAudrey Tan\n\nBiologist Marcus Chua turned 36 on Tuesday, but the birthday was a bittersweet one despite his swanky surroundings in a hotel with views of Singapore’s famous city skyline.\n\nIt might all look five-star, but the reality for many people like Mr Chua, who are now complying with the 14-day stay-home notice (SHN), is far from fancy. Room service, for example, does not come on a silver platter but is hung on his door in a disposable plastic box.\n\nMr Chua’s “birthday staycay” began when he returned from the United States on Thursday night, all ready to serve the stay-home period in a hotel instead of in his own home.\n\n“Even though it was a pity that I could not see my family after arriving in Singapore, it’s actually my preferred option to stay elsewhere so there is less chance of me transmitting the virus to others if I had been infected,” said Mr Chua, a PhD student at George Mason University in the Washington DC suburbs.\n\nThe Ministry of Health (MOH) announced on Tuesday that all Singaporeans returning from Britain and the US from 11.59pm the following day would have to serve the SHN in dedicated facilities instead of their own homes.\n\nThis was because those arriving from the two countries account for the largest share of imported cases by far. Returnees will have their own room and bathroom and all meals provided so that they avoid physical contact with other individuals, MOH said.\n\nMr Chua said on Twitter: “It’s a brilliant move to support the hospitality industry and keep the pandemic at bay.”\n\nHe added that travellers were given special laundry bags to prevent contamination and were notified that spot checks would be done via calls or text messages.\n\nThose who flout the rules may be liable for penalties such as being required to bear the full cost of the hotel stay, according to a circular from the Singapore Tourism Board that was given to returning passengers.\n\nMr Chua, a mammal scientist at the National University of Singapore’s (NUS) Lee Kong Chian Natural History Museum, said he had initially considered staying put in the US to finish the semester, but the escalating crisis there and repeated reminders from NUS and the Singapore Embassy to come home prompted him to change his mind.\n\nHe booked a flight to return to Singapore this Wednesday, but this had to be brought forward after Etihad Airways cancelled the flight.\n\nSome of his colleagues at NUS had collated data on previous flights between Washington DC and San Francisco – where the next homebound Singapore Airlines flight would depart from – and analysed them to find a route that had the least likelihood of being cancelled.\n\nThankfully, his Alaska Airlines flight departed on time and Mr Chua found himself in San Francisco with about a day to spare.\n\nHe said: “There was a huge sense of comfort when I boarded the Singapore Airlines flight. Not only did it remind me of home, it was also comforting to see cabin crew taking precautions by donning surgical masks.”\n\nPassengers were also seated at least a seat apart from one another.\n\nWhen they arrived at Changi Airport, passengers were served SHNs by Immigration and Checkpoints Authority officers and taken by bus to the hotel in groups of 15 in 40-seater coaches. “Perfect for maintaining social distancing,” Mr Chua quipped, adding: “I couldn’t be more impressed and proud of Singapore’s response to Covid-19.”\n\nWhile looking forward to going for a swim and catching up with family and friends after serving his SHN, Mr Chua said he has no lack of things to do. He plans to catch up on his lectures, which are being broadcast online, complete his assignments and write research proposals.\n\n“When all that is done, there’s video streaming and two books to read,” he said. “And I have my binoculars, so there’s also bird-watching. I heard jungle fowls and kingfishers this morning.”\n\naudreyt@sph.com.sg\n\nRoom service for those serving the stay-home notice in a hotel is hung on the door in a disposable plastic box. PHOTO: MARCUS CHUA/FACEBOOK\n\nKEEP OTHERS SAFE\n\nEven though it was a pity that I could not see my family after arriving in Singapore, it’s actually my preferred option to stay elsewhere so there is less chance of me transmitting the virus to others if I had been infected.\n\nBIOLOGIST MARCUS CHUA, who returned from the United States on Thursday night, all ready to serve the stay-home notice in a hotel instead of in his own home.<|endoftext|>WHALE & DOLPHIN WATCHING TRIP REPORT\n\nMALDIVES EXPLORER\nCENTRAL ATOLLS CRUISE\n9 to 20 November 2015\n\nBy tour leader Dr Chas Anderson\nWildWings / WildOceans\nTel: 0117-9658-333\nEmail: tours@wildwings.co.uk\nWeb: www.wildwings.co.uk\nNovember is supposed to be one of the calmest months in the Maldives, but the brewing El Nino brought wind and rain for much of our trip. Despite this, we enjoyed a very productive 12-day wildlife cruise, which took us all the way south to Thaa Atoll, well beyond the normal tourist areas. We had plenty of time to visit a number of beautiful and little-visited islands, both inhabited and uninhabited. Cetacean sightings were good, with a respectable nine different species being recorded. These included a run of Pilot Whales at the start, and a rush of Cuvier’s Beaked Whales and Dwarf Sperm Whales on the very last day when the wind finally died and the sea became flat calm. The snorkelling was fantastic throughout. The corals were magnificent, particularly in Thaa Atoll. The reef fishes were overwhelming in their abundance, diversity and brilliant colouration. But fishy highlights were undoubtedly swimming with Manta Rays and a Whale Shark. Hawksbill Turtles were seen regularly, but there were also sightings of a Green Turtle and a rare, giant Leatherback Turtle.\n\nDay 1, Monday 9 Nov 2015\n\nWe all met at the airport, and were soon on the dhoni heading for the safari boat anchorage and Hope Cruiser. Following welcomes and a briefing, there was time to unpack in the cabins, and come back on deck for a look around before lunch.\n\nImmediately after the tasty meal prepared by our Sri Lankan chef, we were off. As we left the anchorages Spinner Dolphins appeared (well spotted Doug), with one giving an energetic display of spinning.\n\nOut in the ocean, conditions were good, so we felt sure that something would be seen. And sure enough, Pilot Whales were soon spotted (well done Rod and Mike). They gave us the slip to start with, but eventually surfaced. We slowly manoeuvred into a position just upwind, cut the engine, and drifted quietly down amongst them. Soon we had Pilot Whales surfacing alongside and in front of us, close enough", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "**\nLearn about the fascinating stories in stone that can be seen from the Manzanita Lake area. Examine the rocks that have shaped this volcanic landscape. *Outside Loomis Museum.*\n\n**Summit Lake Evening Program**\nJuly at 7:30 p.m., August at 7:00 p.m.\nJoin a park ranger for a lively program about the natural or cultural history of the park. *Summit Lake Amphitheater.*\n\n**Volcanoes!**\nDid you know that every mountain in the park is a volcano or part of one? Learn about the geology and volcanic history of the park. *Outside Loomis Museum.*\n\n**Wildlife Connections**\nLearn about the park’s wildlife and hear stories about their amazing lifestyles. *Outside Loomis Museum.*\n\nPrograms are 45 minutes long unless otherwise noted\nHiking Trails\n\n**EASY TRAILS**\n\n**Devastated Area**\n**Start:** Devastated Area parking area, 10 miles south of Loomis Museum.\n**Length:** 0.5 miles (0.8 km) loop trail\n**Elevation Gain:** None\n**Time:** 30 minutes\nEasy walk along a paved trail. Interpretive exhibits with audio description highlight the eruption of Lassen Peak with great views along the entire trail. Accessible to wheelchairs.\n\n**Manzanita Lake**\n**Start:** Pick up the trail from the Loomis Museum or Manzanita campground.\n**Length:** 1.8 miles (2.9 km) loop\n**Elevation Gain:** None\n**Time:** 1 hour\nEasy walk around the lake. Keep your eyes and ears alert; birds, trout, wildflowers, and wildlife can frequent the lake shore. Trail can be rocky at times. Enjoy catch and release fishing with excellent mountain views.\n\n**HYDROTHERMAL AREA DANGER**\nFor your safety, stay on established trails and boardwalks. Ground in hydrothermal areas can look solid but may actually be a thin crust hiding pools of acidic boiling water. Traveling off-trail in these areas may result in severe injury.\n\n*Stay on established trails to avoid injury*\n*“It feels like I put my leg in a flame”*\n- Visitor injured at Devils Kitchen\n\n**MODERATE TRAILS**\n\n**Bumpass Hell**\n**Start:** Bumpass Hell parking area, 6 miles from southwest entrance\n**Length:** 3 miles (4.8 km) round trip\n**Elevation Gain:** 300 feet (91 meters)\n**Time:** 2 hours\nModerate hike over rocky terrain with grand vistas. The trail drops into an active hydrothermal basin where you can view mudpots and fumaroles. For your safety, please stay on the boardwalk.\n\n**Kings Creek Falls**\n**Start:** 17 miles south of Loomis Museum and 13 miles from southwest entrance\n**Length:** 3 miles (4.8 km) round trip\n**Elevation Gain:** 700 feet (213 meters)\n**Time:** 2 hours\nModerate hike over rugged terrain and small rock formations. Trail forks at end of meadow. Waterfalls and wildflowers are spectacular in late spring. The trail to the bottom of the cascade is closed for trail repair.\n\n**LasSen Trail Guide**\n150 MILES OF TRAILS\nDiscover Lassen with this color guide of day and overnight hikes by local author George P. Perkins.\n\nPurchase Your Copy $19.95\nLassen | Chester | Mineral | Amazon.com\nMODERATELY STRENUOUS TRAILS\n\nCinder Cone\nStart: Butte Lake picnic area near the boat ramp\nLength: 4 miles (6.4 km) round trip\nElevation Gain: 700 feet (213 meters)\nTime: 3 hours\nHike begins along Fantastic Lava Beds, opens up with views of the Painted Dunes, and becomes a strenuous, steep climb with a loose cinder base to the summit. Trails circle and descend into the crater on the summit.\n\nBrokeoff Mountain\nStart: 1 mile before the southwest entrance\nLength: 7 miles (11.25 km) round trip\nElevation Gain: 2,600 feet (792 meters)\nTime: 4 to 5 hours\nSteep trail and tricky early season stream crossings give way to panoramic views of the entire park, the Sacramento Valley, and Mount Shasta. Wildflowers are abundant in early summer.\n\nSTRENUOUS TRAILS\n\nTerrace, Shadow and Cliff Lakes\nStart: 10 miles from the southwest entrance between Lassen Peak parking area and Kings Creek\nLength: 3.5 miles (5.6 km) round trip\nElevation Gain: 550 feet (168 meters)\nTime: 3 hours\nHike alongside three mountain lakes: Terrace, Shadow, and Cliff lakes. The trail is steep between lakes, but mostly flat otherwise. Enjoy a special solitude in this area plus excellent views of the southeastern slopes of Lassen Peak.\n\nRidge Lakes\nStart: Sulphur Works parking area, 1 mile north of the southwest entrance\nLength: 2 miles (3.2 km) round trip\nElevation Gain: 1,045 feet (319 meters)\nTime: 1-1.5 hours\nThis steep climb up a forested ridge rewards hikers with two small alpine lakes cradled in a basin between Brokeoff Mountain and Mount Diller. Stops along the way provide glimpses of Sulphur Works hydrothermal area and Sulphur Creek. Although challenging, this hike offers and opportunity to experience Lassen’s alpine terrain in a short hike.\n\nExplore Safely\nSafety is Your Responsibility\n- Bring water\n- Wear sturdy boots\n- Bring extra food\n- Carry sunscreen\n- Pack a map and compass\n- Take breaks often\n- Check the weather forecast\n- Carry extra layers for warmth\n- Finish your hike before dark\n- Tell someone where you are going and when you will return\nReach the Peak\n\nThe Reach the Peak project is a multi-year effort to restore and rehabilitate the Lassen Peak trail. The project will work to maintain the character of the trail while taking steps to improve the visitor experience and accommodate its increasing popularity and use.\n\nIn 2010, the largest helicopter flight operation in park history strategically placed 2.4 million pounds of stone along the trail. With materials in place for the project’s second year, Lassen Volcanic National Park trail crew and the California Conservation Corps began laboriously strengthening the backbone of the Lassen Peak trail. Despite hazardous work areas and exposure to severe weather, the Reach the Peak trail crew cut and placed nearly 5,000 cubic feet of stone on 75 rock retaining walls and resting areas. These carefully constructed retaining walls will reduce erosion on Lassen Peak’s numerous switchbacks and provide a solid foundation for the higher, steeper sections of trail.\n\nEnjoy Lassen Peak from Afar\n\nMany hikers have discovered another way to enjoy the splendor of Lassen Peak – from afar. Brokeoff Mountain trail (page 11) is a worthy rival to the Lassen Peak trail, passing through dense forests and lush meadows to spectacular panoramic views. The sweeping vistas include Mt. Shasta, the rim of ancient Brokeoff Volcano (Mt. Tehama) and breathtaking Lassen Peak.\n\nLassen Peak, Chaos Crag, Mount Harkness, and Prospect Peak are a few of the volcanoes that fill the panoramic view from atop Cinder Cone. The Cinder Cone trail (page 11) travels alongside Butte Lake and the Fantastic Lava Beds, giving way to colorful views of the Painted Dunes at the base of the cone.\n\nThe Mount Harkness trail offers an opportunity to climb a shield volcano with sweeping views of most of the park, a dramatic view of Lassen Peak, and views of Lake Almanor and Mount Shasta. A historic fire lookout is staffed during the summer and fall. Be sure to stop in and sign the logbook. Bring plenty of water – there is none available in the Juniper Lake area. This moderately strenuous trail is 3.8 miles (6 km) round trip, gains 1,246 feet (380m) and begins near the Juniper Lake campground.\n**Kids in Parks**\n\n**Join the Club!**\n\n**Junior Park Rangers**\nKids between the ages of 7 and 12 are invited to participate in our Junior Park Ranger program. Choose from a variety of activities while learning more about Lassen Volcanic National Park. Kids who complete the Junior Ranger activity booklet can earn a patch and certificate.\n\n**Chipmunk Club**\nOur youngest explorers are welcome to participate in the Lassen Volcanic National Park Chipmunk Club. Kids can learn more about wildlife in the park and earn a Chipmunk Club sticker.\n\n**Green Junior Rangers**\nJunior Rangers, this is your chance to go green! The Green Junior Ranger program encourages kids to think and act beyond the park, “thinking globally and acting locally.” Kids will learn Green Ranger reduce, reuse, and recycle tips that they can practice every day as part of being green. Kids who complete the Green Junior Ranger activity card earn a patch and certificate.\n\n**Sleeping Under the Stars**\nDid you know your school or non-profit group could receive a grant to sleep under the stars at Lassen Volcanic? The Lassen Park Foundation encourages groups to apply for annual camping grants up to $1,000 to help introduce camping and Lassen Volcanic National Park to underserved youth. Selected groups are invited to discover their national park while camping at Crags Campground and participating in hands-on, ranger-led activities.\n\nIn order to provide the invaluable experience", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " and to prepare properly.\n\nHow can I plan for shore landings? Special clothing is required for the shore landings (Antarctica, Galapagos); please refer to your predeparture documents for important details.\nAre all theatre performances suitable for children? Some theatre performances may be unsuitable for children – please consult your tour manager.\nDocumentation\nDo I need a passport? A valid passport is required for all trips. All passengers should check with the appropriate foreign consulate for entry and validity requirements as well as other laws that may affect your ability to travel. We recommend that your passport has six months validity, and at least three blank pages. Passports and visas are the responsibility of each traveller.\nExtending Your Stay\nCan I extend my tour to see more of a region? Yes! You may enhance your tour by purchasing either an extension or pre/post hotel stays when offered. Extensions may be “hosted” rather than escorted. When hosted, passengers will be greeted upon arrival by a local tour manager who will be available on-call during the duration of the stay. A minimum number of passengers may be required to operate some extensions. Extensions not purchased at time of deposit are subject to availability and applicable charges at time of request.\nCollette also offers pre and post hotel nights before and/or after a tour. Should you purchase additional nights, your tour manager will not be available during this time.\nExtras\nWhat is not included in the tour price? The land price does not include international air travel from Australia, airline fees, airport or departure taxes, transfers, visas, customary end-of-trip gratuities for your tour manager, driver, local guides, hotel housekeepers, cruise ship waitstaff, and any incidental charges.\nLate Bookings\nDo you accept late bookings? Yes, tour sales normally close 7 days prior to departure. Late bookings are on request and must be guaranteed with full payment if within 60 days of departure date.\nOn-Tour Experience\nWhere do I meet my tour manager? Our tour manager will make contact with you at your first hotel. The hotel’s address and phone number will be included in your documents.\nCan I pre purchase optional excursions/activities? Yes, the majority of optional excursions and activities are available for advance purchase provided that you make your options purchase 15 days or more prior to the tour start date. Collette makes it convenient to reserve presold options by visiting our website for a full listing of activities and excursions or when your reservation is made with our team. In addition, there are benefits to pre-purchasing options including a price guarantee once your tour is paid in full, so once payment is received in full, your preselected options are guaranteed by Collette. Although you can still purchase options while on tour, reserving them ahead of time ensures you a spot in the event that the activity sells out. Collette will provide a refund if you cancel a presold option prior to tour departure. Any presold options cancelled while on tour are nonrefundable.\nRevisions / Changes\n\nWould my tour date ever be changed? While it is unlikely, Collette does reserve the right to cancel any tour prior to departure. Should this happen, Collette will make every effort to put you on another departure date. If an alternate cannot be found, a full refund will be made. Air booked through Collette will be protected. We cannot be held responsible for penalties incurred if you secured your own air.\n\nCan I make changes to my reservation? Should you decide to change your reservation after initial booking, a handling fee of $25 per transaction will be charged. A change of tour date or tour itinerary within the guidelines of the cancellation policy will be treated as a cancellation and regular cancellation fees may apply.\n\nRevisions to air tickets are subject to the rules and regulations of the airline. See our Cancellation Policy for more details.\n\nTour Pacing\n\nHow can I be best prepared for the pacing and physical requirements on a Collette tour? Tour pacing varies by itinerary, and each destination’s activities are unique. Pacing is subject to personal interpretation. For overnight pacing of a tour, please refer to the “Accommodation” section on each tour page and on the tour map. The day-by-day descriptions will provide additional detail about the number of activities included in each day.\n\nThe Tour Activity Level Ranking is featured on each tour itinerary in a circle. The definition of each activity level is listed here. If you have additional questions regarding a specific tour, please inquire at time of reservation.\n\nLevel 1: At a very leisurely pace, this tour involves minimal physical activity, such as climbing some stairs, boarding a motorcoach, and walking from the hotel reception area to hotel rooms and dining areas.\n\nLevel 2: This tour requires average physical activity. You should be in good health, able to climb stairs and walk reasonable distances, possibly over uneven ground and cobblestoned streets.\n\nLevel 3: This tour includes moderate physical activity. The itinerary blends some longer days with shorter days and more leisure time. Walking tours, as well as walking slightly longer distances, up stairs or on uneven walking surfaces should be expected.\n\nLevel 4: To truly experience the tour and destination, you need to be able to participate in physical activities such as longer walking tours, walking over uneven terrain, climbing stairs and periods of standing. Some of the touring days may be longer, with select included activities occurring later in the evening.\n\nLevel 5: This tour is very active, requiring participants to be physically fit to fully enjoy all the experiences. This itinerary has more strenuous activities which may include such things as: extensive walking tours, transfers over uneven and dusty terrain, high altitudes, early morning departures, late night activities, or extreme temperatures. All conditions do not apply to all days, so please read the itinerary carefully and speak to one of our customer care agents to determine if this tour is right for you. We recommend this programme to individuals who are physically fit. Unfortunately, this tour is not appropriate for individuals who use either walkers or wheelchairs.\n\nTransfers\n\nAre airport and hotel transfers available? Roundtrip airport-to-hotel transfers are provided for all passengers who purchase airfare through Collette. These transfers do not apply to pre- and post-night stays. Passengers who do not purchase airfare through Collette can purchase transfers (for the first and last day of the tour) at an additional cost from $120 per person, roundtrip. Some restrictions may apply. All transfers leave at prescheduled times.\n\nAre airport transfers available for pre/post hotel stays? All passengers who purchase pre and post hotel nights through Collette may also purchase transfers to/from the airport and the pre or post hotel. Please inquire at time of booking.\n\nWhat is the private chauffeur service? It’s your ticket to and from the airport. This personalised service is included within a 40km radius from Sydney, Melbourne, Brisbane, Adelaide, Perth, Canberra, Darwin, Cairns and Hobart airport gateways. * Service is available between 41-70 kms for a small fee. Not valid on group travel. * One transfer per room booking. Additional stops are not permitted on route.\n\nVisit gocollette.com/chauffeur for a video and more details on this amazing service!\n\nTravel Loyalty\n\nWhat is the Collette Passport Club? Formerly Travel Loyalty by Collette, the Collette Passport Club recognises past guests and allows you to automatically receive a $150 travel credit for each trip you take.† It’s our way of saying thank you for making us your #1 choice in guided travel.\n\n† Full credit is valid for your next tour when you travel within 12 months of the original trip. $100 of the credit remains valid for travel within 13-24 months, and the entire credit expires 24 months after the original trip.\nAdding Flights to your Collette Tour\n\nEnjoy the benefits of air-inclusive bookings. Allow us to be your liaison with the airlines and to handle all the details.\n\n
\n\n
\n
Flex Economy Airfare
\n
Instant Purchase Economy Class²
\n
Premium Economy, Business & First Class³
\n
\n\n\n
\n
Free roundtrip airport to hotel transfers included¹
\n
●
\n
●
\n
\n
\n
Dedicated Concierge Service
\n
●
\n
●
\n
\n
\n
Lounge Passes⁴
\n
●
\n
●
\n
\n
\n
Express Check-In⁴
\n
●
\n
●
\n
\n
\n
Eligible for Collette’s Travel Protection Plan
\n
●
\n
●
\n
\n
\n
Benefit from our flexible change and refund policies
\n
●
\n
●
\n
\n
\n
Deposit now, pay the balance later⁵
\n
●
\n
●
\n
\n
\n
Eliminates future surcharges by locking in price
\n
●
\n
●
\n
\n
\n
All the perks of upgraded air (more space, comfort and service)
\n
●
\n
●
\n
\n\n
\n\n¹) These are available on the first and last day of the actual tour dates and when you are travelling on select flights (not applicable to pre & post nights). Land only clients may purchase transfers on the first and last day of the actual tour dates for an additional cost (some restrictions may apply). Clients who purchase pre/post hotel nights may purchase transfers to/from the pre/post hotel. ²)", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "34 📞 (432) 426-3337\n\nGPS\nLatitude 30.599926 | Longitude -103.925934\n\nFind the coolest place in a hot state when you camp in mountains one mile high at this CCC-built park. The park is in the Davis Mountains, the most extensive mountain range fully contained in Texas. Motor into a full hookup site (with cable TV), backpack to a high overlook, make camp under the trees, check out the two beautiful wildlife viewing areas, or stop by Indian Lodge, located in the park. While you’re here, visit Fort Davis National Historic Site or attend a star party at the McDonald Observatory.\nFed by clear springs flowing from seeps and streams, the Devils River is one of the most pristine rivers in Texas. The state natural area is large, remote and has been named an International Dark Sky Sanctuary. Visit for day hiking, mountain biking, camping and paddling. All camping and facility stays are by reservation only. Make reservations at least one day in advance.\n\nA permit is required for all paddling trips on the Devils River which access TPWD-managed lands. For more information, visit the park’s webpage.\n\nBring a picnic when you visit this 1848 adobe fortress and trading post, which sits on a bluff overlooking a valley that leads to the Rio Grande. Ben Leaton traded with Apaches, Comanches and Mexicans here. Today the site is an active museum offering programs, reenactments, tours and colorful events. Enjoy the holidays with the annual reenacted posadas in December.\n\nThis is the western gateway to Big Bend Ranch State Park. Obtain permits here, as well as information on hiking, biking, river and equestrian opportunities. 🎈\nFranklin Mountains State Park\n\nHeadquarters: 1331 McKelligon Canyon Rd., El Paso 79930 📞 (915) 566-6441\n\nTom Mays Unit: 3.5 miles east of I-10 on Transmountain Rd.\n\nAt the westernmost tip of Texas, where mountains meet sky and cities hug the Rio Grande, lies the largest state park in an urban setting. Franklin Mountains State Park encompasses 26,627 acres in the city of El Paso. Hike rugged terrain in 40 square miles of Chihuahuan Desert wilderness, scrub vegetation and open space. Over 100 miles of multiuse trails are popular with hikers and mountain bikers. Camp and picnic, too. Ground fires must be in designated fire rings. You can build charcoal fires in grills at picnic sites.\n\nHueco Tanks State Park & Historic Site\n\n6900 Hueco Tanks Rd. No. 1, El Paso 79938 📞 (915) 857-1135\n\nNatural rock basins in granite outcroppings give Hueco Tanks its name. These basins capture rainwater, a precious resource in the Chihuahuan Desert. For millennia, people have come for water, as well as for the diverse plants and animals here. These people left behind curious and beautiful paintings. Today this ancient site preserves over 2,000 pictographs.\n\nWe limit visitors to protect the site. We recommend reservations for day use, camping and tours. Pictograph, hiking and bouldering tours in the guided area are available by advance request Wednesday through Sunday.\nIndian Lodge State Park\n16453 Park Rd. 3, Fort Davis 79734 📞 (432) 426-3254\nGPS Latitude 30.592877 | Longitude -103.943596\n\nIndian Lodge is nestled in the Davis Mountains, within Davis Mountains State Park. This southwestern, pueblo-style adobe lodge will charm you. Its original handcrafted interiors and furnishings date from its 1930s construction by the CCC. Guest rooms have cable TV, telephones and private baths. The lodge also has a full-service restaurant, group meeting room, swimming pool, and access to trails from the parking lot. This is truly a unique destination.\n\nMonahans Sandhills State Park\nPark Rd. 41, Monahans 79756 📞 (432) 943-2092\nGPS Latitude 31.618795 | Longitude -102.812112\n\nFun-loving travelers surf sand dunes that rise as high as 50 feet in this geologic wonderland. These sand dunes are a small part of a larger 200-square-mile dune field stretching into New Mexico. Rent sand disks at headquarters. The Dunagan Visitor Center features hands-on exhibits on dune dynamics and desert wildlife. Picnicking and camping are also popular. The park has an 800-acre equestrian area and three equestrian campsites, as well. The park is at exit 86 off I-20 west of Odessa, just east of Monahans.\nSeminole Canyon\nState Park & Historic Site\nHwy. 90 W., Park Rd. 67, Comstock 78837 (432) 292-4464\nGPS Latitude 29.7001 Longitude -101.313058\n\nAncient pictographs, rugged limestone terrain and spectacular canyons lure visitors to this park. People of antiquity once lived in natural rock shelters carved into canyon walls. They painted distinctive ancient symbols that tell us of their passing. The park's rock art is more than 4,000 years old. Learn more at the park's museum.\n\nHike the rugged landscape or camp in a tent or RV. Take a guided rock art tour Wednesdays through Sundays at 10 a.m. and 3 p.m. (times vary in summer). Contact the park for more information.\n\nTwo Ways to Show Your Love for Texas State Parks\nFor only $30/year, outfit your vehicle, motorcycle, trailer or RV with a Texas Conservation License Plate. Best of all, $22 of the $30 directly benefits Texas State Parks.\n\nConservationPlate.org/StateParks\nYour mom never went glamping.\nSo just pack up the family, fill the cooler full of Rambler,\nand get out there and go make some memories.\n\n#RaiseARambler\nSpecial thanks to Toyota, whose generous support made this guide possible.\nBrazos Bend State Park\n21901 FM 762, Needville 77461 📞 (979) 553-5101\n\nGPS Latitude 29.380798 | Longitude -95.594658\n\nBrazos Bend has almost 5,000 acres of lakes, prairies and forests. Live oak trees draped in Spanish moss shade the park's picnic areas. Explore more than 30 miles of multiuse trails, where you'll see alligators, white-tailed deer and over 300 bird species. Choose from six small lakes and a winding, tree-lined creek for fishing. Touch a hatchling alligator at the park's nature center, which is open daily. Nature programs offered every weekend and most holidays.\n\nGeorge Observatory leads star parties on Saturday nights. Call (281) 242-3055 for information.\n\nGalveston Island State Park\n14901 FM 3005, Galveston 77554 📞 (409) 737-1222\n\nGPS Latitude 29.198755 | Longitude -94.956212\n\nGalveston Island State Park is an excellent example of Texas Gulf ecology, with 2,000 acres that spans from the beach to the bay. Access is open to the bayside of the park, where coastal prairie, freshwater ponds, and salt marsh yield ample hiking, fishing, kayaking, and wildlife viewing opportunities. Historic houses, tent and multiuse campsites with restrooms and showers nearby are available on this side of the park.\n\nThe beachside area is closed as it undergoes renovations. Please check website for closure updates.\nGoose Island State Park\n202 S. Palmetto St., Rockport 78382 ☏ (361) 729-2858\n\nBrown pelicans, rare whooping cranes and fishing in the bountiful waters of Aransas, Copano and St. Charles bays draw visitors here. The CCC built Goose Island, Texas’ first coastal state park. It sits on the southern tip of the Lamar Peninsula. Dramatic wind-sculpted trees dominate the park. The “Big Tree,” a massive coastal live oak estimated to be centuries old, is one of the natural wonders of Texas.\n\nContact the park for updates on Hurricane Harvey impacts and recovery.\n\nLake Corpus Christi State Park\n23194 Park Rd. 25, Mathis 78368 ☏ (361) 547-2635\n\nSwimming, boating, waterskiing and sailboarding fill summer hours on this large placid lake. Angling for black bass, striped bass, crappie and catfish are year-round pleasures. The CCC built an impressive caliche crete open-air refectory here. It has arched", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " towards tourism, including whether the community is hospitable, are important for the sustainability of tourism in local communities.\n\nIn South Africa, the level of involvement of local communities in tourism is very low. The role of the local authority is important in stimulating community-based tourism development and tourism-driven LED. The local authority should play a role in marketing the local area to tourists and to the private sector for tourism-related investment. A local authority that is well resourced may be able to commission studies on a variety of issues such as statistical information on the volume of tourists in the locality, creating partnerships with the private sector and tourism promotion and marketing (Charlton and Essex, 1995: 43).\n\nAt the time of the American study, the local communities in Illinois were aware of tourism’s benefits. Wilson, et al. (2001: 136) feel that if communities are involved and appreciate their involvement, their word of mouth and pride in what they have will be the best way to promote local tourism. It must be acknowledged that not all community members will support and value the importance of tourism in their own areas, especially if they do not benefit from it.\nAn important consideration is that structures are accessible and opportunities available for their involvement, should they wish it.\n\nThe American study underscores the importance of both promoting the attractions and services available to tourists and of the knowledge of where aspirant tourism entrepreneurs may receive technical assistance. If the Americans with their high literacy rate regard technical assistance in marketing and drafting of business plans important, South Africa’s rural communities will need them even more owing to their low level of literacy. The respondents in the American study emphasise the importance of tourism information and assistance and the need for organised central agencies and councils to provide them with information and technical assistance (Wilson, et al. 2001: 136)\n\nA study on the Highlands Meander, a tourism region in Mpumalanga Province, by Rogerson (2002a: 161), states that black local communities lack an appreciation of the importance of the tourism industry. Without in-depth understanding of the great potential offered by tourism, they will not fully appreciate its great potential. Local communities lack information on how they could interlink with the tourism industry. This lack of information on tourism’s potential to stimulate local socio-economic development is one of the challenges which requires the combined resources and efforts of both private and public sectors.\n\nIn South Africa, local communities lack the necessary training and this prevents them from participating meaningfully in the tourism industry. They do not have the expertise to operate a successful tourism venture (Killion, 2001: 181; Kaplan, 2004:217) and are consequently not in a position to enjoy tourism’s socio-economic benefits.\nIn an interview with Marx (2003a: 17), Matlou responded to a question on the importance of technical and general knowledge of the tourism industry as prerequisites for successful entrepreneurship by emphasising that those who want to venture into the tourism business require sound business principles in management, marketing and finance. They need to have business plans, to know the market and the resources required and, above all, to be prepared to work hard just like in any other business.\n\nThe support and involvement of local government is crucial to local tourism development. According to the participants in the American study, the role of local government should be funding and promotion; creation and maintenance of the infrastructure necessary for tourism such as roads, airports, reliable water and electricity supplies; and zoning and maintenance of the community so that it is clean and appealing to tourists. Stakeholders should also invest in education and occupational support for tourism employees and entrepreneurs (Wilson, et al. 2001: 134).\n\nOther examples of local government support for tourism are listed as funding the production of brochures, organising and improving traffic systems, keeping the streets clean and free of potholes and beautifying downtown areas by planting flowers (Wilson, et al. 2001: 134). Fortunately, the Panorama region has fairly good roads and fairly clean towns. The only streets that are not tarred are the ones in the villages. Otherwise, road maintenance and tourism signage are visible through towns right into the picturesque mountains. Men weeding the verges at the top of mountain passes are a common sight.\n\nInadequate funding for tourism development and promotion presents a problem in South Africa and elsewhere (as revealed by the American study). Rural communities are generally trapped by poverty. They do not have the capital\nresources to invest in business development. The investors, on the other hand, most of whom are private and from the big cities, are hesitant to invest in rural communities. Between 1995 and 1998 investment in the tourism industry in South Africa amounted to R44.9 billion, split among seven sectors, the main beneficiary being the construction sector (United Nations, 2001: 2).\n\nThe above figure may not mean anything until one establishes who was investing and in which geographic area this investment was made. Take for example the building of complexes which received 21% of the R44.9 billion – shopping complexes not owned by black business people and built without black economic empowerment deals do not lead to black economic empowerment. They perpetuate the class divisions among the South African population. Even services (which got 6% and attractions, which received 2%) will not mean anything until one knows where the investment was made.\n\nAccording to the American study, successful communities are those that provide tourists with packages which persuade them to stay longer and to spend more. Those that have something to offer but do not provide attractive packages continue to receive smaller numbers of tourists (Wilson, et al. 2001: 134). The marketing strategy of South African Tourism currently includes promoting the Southern African Development Community (SADC) as a tourist region. Tourists are offered packages to South Africa and the SADC countries and are also encouraged to stay longer and spend more (South African Tourism, 2002: 38).\n\nIn South Africa, aspirant tourism entrepreneurs still struggle with packaging the tourist product. This thwarts all prospects of compiling a comprehensive package for tourists because such packages include a variety of products usually provided by more than one tourism entrepreneur.\nPackaging the tourist product involves putting it together in a consumable way, considering factors such as the nature of the product, its accessibility, the area’s natural beauty, climate, affordability, health considerations, socio-political stability and telecommunication. The overall objective should be to package a tourist product in a way that attracts and attains tourist satisfaction. The satisfaction of tourists has many advantages for local communities in that it leads to more spending, longer stays and repeat visits.\n\nIn an interview with Marx (2003a: 18), Matlou notes that packages should be created to include a stay in the townships. He says that the way the country is marketed may spell doom or boon for the emerging tourism entrepreneurs. He emphasises the need to market South Africa as a multicultural country while not discarding the traditional approach of marketing it as a country featuring the Big Five.\n\nThe difference between the experiences of the Americans in Illinois and the local communities in Mpumalanga Province is that the Americans are directly empowered by local tourism events whereas in Mpumalanga Province only the established white tourism entrepreneurs benefit. During the World Gold Panning Championship in Pilgrim’s Rest, Mpumalanga Province, held in September 2005, mainly white entrepreneurs benefited. Their accommodation was fully utilised as were their transport and restaurants. Local black vendors tried unsuccessfully to sell their crafts, the main activity they do for themselves by themselves, but on the day participants in the Gold Panning Championship bought mainly alcohol and food, not crafts.\n\nThe American study emphasises coordination and cooperation between business people and local leadership. It encourages partnerships between the local communities and the public and private sectors. Utilisation of the funds\nearmarked for investment in community-based tourism projects requires that all stakeholders work together.\n\nIn Chapter 4 of this study a project that remained a ‘white elephant’ in Chieftain Mohlala’s community because of a lack of consultation and cooperation is discussed. The government approved a tender for the construction of a cultural centre. To date, the cultural centre stands empty and unutilised. The participants in the American study emphasise the importance of consultation, proper coordination and cooperation by all stakeholders.\n\nIn Mpumalanga Province specifically and South Africa as a whole, the best approach will have to include mentoring of emerging tourism entrepreneurs by those who are established. Unfortunately, South Africa’s race relations have not yet matured to a stage where voluntary mentoring is possible. In the researcher’s opinion, consideration must be given to providing incentives to mentors. Without such incentives, it is unlikely that any tourism entrepreneur will want to use his or her time in mentoring others.\n\nStrategic planning is vital in preparation for any business venture. Proper planning delivers expected results and avoids wastage of time and capital resources. In South Africa there is no shortage of policy frameworks for the development of communities. The problem is in implementation, monitoring and evaluation of development initiatives.\n\nThe participants in the American study perceive cooperation among tourism entrepreneurs as an important factor for successful tourism development (Wilson, et al. 2001: 135). This is understandable considering the multi-sectoral nature of the industry. It fosters relations with different types of economic sectors and businesses. The use of a core-group in communities, which\npresumably adopts the role of LEDA in South Africa, to make tourism work is, however, an experience that remains remote in the thinking of local communities in the Panorama region.\n\nIn Chapter 5 of this study, sub-section 5.3.3, it is stated that the use of development agents or consultants is common in South African tourism development. These development agents are", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "odus from the city:\n\n“There is another kind of trouble, more psychological in nature. Fear of crime and impatience with bad services drove people away in the 1970's. Today the city is coping with a broader fear, of being a target of international terrorism. How does it even begin to address that, other than with bravado and clever television commercials starring pretend ice skater Woody Allen?” (Purnick 2001a).\nThe tourism-related industries were called upon to create the tableau in which spiraling fears regarding New York City’s future could be anchored for these industries had the resources and means to stabilize the free-fall of the city’s place in the global economy.\n\nTable 5.1 provides a timeline of the tourism-led growth coalition’s activities in the months succeeding 9/11.\n\nTable 5.1: Timeline of the New York City tourism-led growth coalition’s efforts in the months succeeding the attacks of September 11, 2001.\n\n
\n\n
\n
Date
\n
Event
\n
\n\n\n
\n
September 11, 2001
\n
Terrorist attack on the World Trade Center in New York, as well as the Pentagon in Washington, DC. Downing of United Airlines Flight 93 in Shanksville, PA.
\n
\n
\n
September 12, 2001
\n
Executive Committee Meeting of NYC & Company. Decision made by Mayor Giuliani for curtains to again rise on Broadway on September 13. At the meeting, the Mayor asked the city’s restaurant community to aid in feeding Ground Zero rescue and relief workers.
\n
\n
\n
September 13, 2001
\n
Broadway theaters reopen.
\n
\n
\n
September 16, 2001
\n
Mayor Giuliani holds press conference at Command Center and states that the best way to help the city is to spend money and go see a show.
\n
\n
\n
September 18, 2001
\n
Anthrax-tainted letters are postmarked at a Trenton, NJ post office, addressed to the offices of NBC News and The New York Post in New York.
\n
\n
\n
September 21, 2001
\n
Congress passes bill, with the support of the White House, providing liability protection for the airlines as well as proving the airlines with cash and loan guarantees.
\n
\n
\n
September 21, 2001
\n
9/11 Interfaith memorial service held at Yankee Stadium.
\n
\n
\n
September 25, 2001
\n
New York Times/CBS News poll reported that eighty-four percent of Americans say they have a good image of the city, up from 61 percent when the question was last asked in early 1998. Mayor Giuliani receives a 95 percent approval rating nationwide.
\n
\n
\n
September 27, 2001
\n
American Society of Travel Agents moves their annual event from Spain to New York.
\n
\n
\n
September 27, 2001
\n
President Bush delivers speech from the tarmac of O’Hare International Airport in Chicago, urging Americans to “take your families and enjoy life, the way they want it to be enjoyed.”
\n
\n
\n
September 28, 2001
\n
League of American Theaters and Produces wraps up production of their “Let’s Go On With the Show” television ad, featuring cast members of all the major Broadway productions.
\n
\n
\n
October 1, 2001
\n
Mayor Giuliani addresses the United Nations General Assembly.
\n
\n
\n
October 2, 2001
\n
New York State announces pledge of $40 million for an I Love New York tourism promotion campaign.
\n
\n
\n
October 2, 2001
\n
Delta Air Lines named official airline of NYC & Company, pledging 10,000 free tickets to New York. Mayor Giuliani attends the press conference, held at the offices of NYC & Company, announcing this development. This was the first formal press conference that the Mayor held away from the Command Center.
“A New Day” ad, narrated by Governor Pataki and Mayor Giuliani, begins airing on television.
\n
\n
\n
October 31, 2001
\n
A 61-year old hospital stockroom worker from The Bronx infected by New York’s first case of inhalation anthrax died at Manhattan’s Lenox Hill Hospital (Lipton 2001b).
\n
\n
\n
November 3, 2001
\n
“Paint the Town Red, White and Blue” promotion announced by NYC & Company.
\n
\n
\n
November 24, 2001
\n
Macy’s Thanksgiving Day Parade held as scheduled.
\n
\n
\n
November 30, 2001
\n
“Canada Loves New York” program launched.
\n
\n
\n
December 5, 2001
\n
“I Love New York for business” ad campaign announced by Governor Pataki.
\n
\n
\n
December 10, 2001
\n
“Every Dollar Spent Downtown Is A Dollar Spent Rebuilding It” promotional campaign launched by the Alliance for Downtown New York Business Improvement District.
\n
\n
\n
December 12, 2001
\n
Mayor Giuliani and NYC Department of City Planning unveil a study titled “Far West Midtown: A Framework for Development.”
\n
\n
\n
December 20, 2001
\n
Ellis and Liberty Island reopens for visitors.
\n
\n
\n
December 30, 2001
\n
Ground Zero viewing platform opens to the public.
\n
\n
\n
January 1, 2002
\n
Michael R. Bloomberg succeeds Rudolph Giuliani as Mayor of New York City. Daniel Doctoroff, the President of NYC 2012 (the private group dedicated to bringing the 2012 Olympics to New York), becomes Deputy Mayor of Economic Development and Rebuilding.
\n
\n
\n
January 1-16, 2002
\n
“Spend Your Regards to Broadway” promotion conducted. The promotion is announced on December 18, 2001.
\n
\n
\n
January 6, 2002
\n
League of American Theaters and Producers release a coupon book providing incentives for Broadway and Off-Broadway shows, as well as local hotels, restaurants and parking garages.
\n
\n
\n
February 3, 2002
\n
Senators Schumer and Torricelli announce their effort to secure the 2007 NFL Super Bowl.
\n
\n
\n
February 5, 2002
\n
NYC Firefighters sent on nationwide “thank-you” tour.
\n
\n
\n
February 27, 2002
\n
Do It Downtown! discount card program launched by Wall Street Rising.
\n
\n
\n
April 3, 2002
\n
Announcement that the 2003 Grammy Awards will be held in New York.
\n
\n
\n
May 8-12, 2002
\n
First annual Tribeca Film Festival. The Festival is announced at a press conference with Robert DeNiro, American Express CEO Kenneth Chenault and Mayor Bloomberg on March 21, 2002.
\n
\n
\n
May 13, 2002
\n
Jonathan M. Tisch succeeds Tim Zagat as the chairman of NYC & Company.
\n
\n
\n
Summer 2002
\n
River to River Festival is organized by the Alliance for Downtown New York and sponsored by American Express.
\n
\n
\n
August 2002
\n
Formal effort begins by NYC & Company and NYC Big Events to recruit the 2004 Democratic and Republican National Conventions.
\n
\n
\n
August 27, 2002
\n
The United State Olympic Committee announces that New York would join San Francisco as the finalists to represent the", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": "ateur sample, intensification of competition was repeatedly identified as the primary cause of this gruelling and underrewarded toil (Ram et al. 2000). As we have argued elsewhere (Ram et al. 2002), the restaurant sector is no less subject to market saturation than most of the other sectors in which Asian businesses are concentrated, a paradoxical situation at first sight. Unlike retailing and CTN (confectionery–news–tobacco), where the impact of supermarket and other corporate competition has wrought catastrophic havoc on the small Asian entrepreneur’s market position (Jones and Ram 2003), the Asian restaurateur basks in a sector with explosive growth in customer spending, underpinned by a seemingly inexhaustible white middle-class consumer base. Nevertheless, the reality is that restaurants, takeouts and other supply outlets have grown even faster than demand – the result of what might be described as a ‘gold-rush effect’, where excessively large numbers of prospectors are drawn in by the hope of rich pickings. As in an actual goldfield, it is generally the first entrants who thrive, while the later arrivals struggle.\nEnthusiasts for the benign qualities of entrepreneurialism as liberator and enricher of the individual are fond of extolling the profit-making opportunities offered by the various ‘niche markets’ supposedly opened up by the post-industrial economy. By their very nature, however, such niches tend to fill up very rapidly and, unhappily, South Asian business owners in Britain have discovered that every niche they have pioneered has soon been flooded by a surfeit of competitors—fellow Asians metaphorically slitting one another’s throats (Jones et al. 2000). Even that most niche-like of niches, exotic catering, has not proved immune from the process, despite Asians enjoying both customer growth and an effective ethnic monopoly. While competition among the balti houses themselves constitutes an onerous threat in its own right, owners also identified additional competitive pressures from non-balti outlets like fish-and-chip and fast-food shops and from the growth of balti houses in other parts of the city region (Ram et al. 2000).\n\nAt this juncture, we need to qualify any impression that these restaurant owners are no more than pawn-like victims of an antagonistic commercial environment. Indeed this is one of the pivotal issues in the entire debate about ethnic minority enterprise: the question of self-determination versus external determination, agency versus structure. For our own part, we have consistently laid stress on the political-economic environment in which such entrepreneurs are embedded, a stress designed to counter over-optimistic accounts of Asian business as a success story resting on the autonomous resources of the ethnic community. Nevertheless, there is still a sense in which, like any other social actor, Asian entrepreneurs must be recognized as active agents exerting free will and choice to adapt to market pressures which in themselves are far from absolutely inevitable or deterministic. On the contrary, there is a range of managerial options—ostensibly at least—and Asian restaurateurs can be seen to be striving with considerable ingenuity to ameliorate and adapt to competitive stress (see Ram et al. 2002 for fuller account of adaptive strategies). Most successful are those who have ‘gone upmarket’, differentiating themselves from the competition by the conspicuous opulence of their premises and the reputation of their cuisine. Often such businesses are (re)located in affluent suburban or city centre premises well removed from the inner-city squalor of the Balti Quarter, distancing themselves physically as well as socially from the mass. Yet in the last instance, however proactive and creative their strategy, Asian restaurateurs’ strategic space is rigorously constrained within parameters fixed by external market conditions. Success is strictly rationed by price in the capitalist market, and because the upmarket strategy is essentially capital-intensive, it is open only to a minority of small Asian entrepreneurs. Typically, Asian entrepreneurs are under-capitalized and lack the means to execute ambitious projects requiring costly sites, premises and equipment (Ram et al. 2002). Proactive adaptation is\ncertainly to be recommended, but it cannot be piously assumed, given the average entrepreneur’s non-possession of the necessary resources.\n\nIf this line of reasoning still appears to play down the force of entrepreneurial agency, we would remind the reader that we are far from alone in questioning the small business owner’s freedom of self-determination. Chapman (1999) is one observer who disputes whether the term ‘strategy’ is applicable at all in small firms, where the owner’s workload is too time-consuming to allow for strategic thinking, and where management is more likely to consist of ad hoc reaction, ‘just muddling through on the basis of custom, trial and error; … a course of action is not a strategy if it has been forced on one by circumstance’ (Chapman 1999: 77). In similar vein, Curran et al. (1991) refer to small business strategies as ‘hypothetical’. Significantly, these writers are addressing small firms as a whole rather than those owned by ethnic minorities, whom we might suppose to be even more constrained.\n\nIn the light of these strategic non-options, it comes as no surprise that Birmingham Asian restaurateurs’ responses to market pressures tend to take the familiar low-tech labour-intensive cost-cutting form that has bedevilled Asian business owners in Britain from the very outset. As the case of the Punjabi restaurant cited above suggests, this need not always be disadvantageous, since an effective low-cost strategy is available through the creation of a unique gastronomic identity. Yet even this depends on high-quality culinary skills, another scarce resource beyond the reach of many. More typically, restaurateurs rely for their survival on a very basic form of price competition, with menu tariffs maintained at a low level, dependent on the entrepreneur’s willingness to accept uneconomic returns for long and unsocial working hours. While this is certainly to be seen as active agency, it is hardly an inspiring recommendation for the virtues of free will and choice – nor indeed for multicultural urban reinvention. To put it baldly, Birmingham’s vaunted multicultural culinary experience, its vast choice of innumerable and affordable curry houses, would be decisively compromised if all Asian restaurateurs operated according to capitalist calculative rationality and actually insisted on profitability as a condition for their existence. If, on top of this, they were also to desist from cutting regulatory corners, the outcome could only be a drastic reduction in the number of catering outlets. The sector’s continuance and further development as an urban re-branding exercise rests entirely on Asian entrepreneurial self-exploitation (not to mention self-criminalization) – and indeed on worker exploitation, as we shall discover in the following section.\n\n**Employees**\n\nRunning incessantly throughout the discourse in this field is the theme of the family as a decisive source of labour power for the ethnic minority business. Whether in catering or elsewhere in the economy, family\nmembers are seen as a trusted, flexible and cut-price labour supply that gives these businesses a competitive edge (see Ram and Jones 1998 for a review). Highly advantageous in principle, in practice family business units can be riddled with all manner of schisms on generational and gender lines and can be hampered by nepotistic loyalties (Ram and Jones 1998). Moreover, in the case of restaurants, the role of family members is qualified by two special considerations. First, the rising expectations of the British-born generation – and often of parents on behalf of their children – mean that fewer young family members wish, or are compelled, to submit to the drudgery of the late-night catering business. Second, the necessary scale and division of labour in the typical restaurant compels additional recruitment beyond the familial bounds, though almost always within the co-ethnic community. Scholarly accounts of the resulting boss–worker relationships have tended to be polarized between the narrative of sweated exploitation recounted by writers like Mitter (1986) and the idealistic representations of workplace harmony, where face-to-face paternalism and common ethnic bonds can apparently transcend the normal class antagonisms (Werbner 1990).\n\nWhen these ethnic minority models of industrial relations are set against the mainstream discourse on small firms, one is struck by the degree of similarity – by the way in which the behaviour of ethnic minority firms is no more than a variation on a universal theme. According to Chapman (1999), the belief in small-firm working relationships as essentially harmonious is a long-standing theme applying right across the board, irrespective of ethnicity. Over time, the harmony thesis has become subject to critical scrutiny, with the small workplace increasingly recognized as the site of a complex range of possibilities. One possibility is that control is exerted through persuading workers to collude willingly in the process – though, as Goss (1991) makes clear, there are various degrees of this. His own typology of small-firm control strategies ranges from fraternalism and paternalism, where the boss’s authority is heavily disguised under a veil of personalized face-to-face pseudo-equality; through benevolent autocracy, where authority is overt but tempered by grace and favour; to sweating, which speaks for itself. In applying this kind of mainstream thinking to Asian firms, Ram (1994) argues for what he describes as ‘negotiated paternalism’, a regime far from conflict-free, but in which employees enjoy more than the customary leverage.\n\nCertainly many of our own interviews bear testimony to the benefits for workers that lie in these informal industrial relations practices. Among the fringe benefits mentioned are lifts to and from work and free food on the premises, though like any other paternalistic rewards these are contingent on the whim of the employer. Looking more closely at Asian restaurant practices in the light of Goss (1991), we emphasize that relationships", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " Non-Motorized Recreation Plan is intended to guide DNR in planning, developing, and managing non-motorized recreational opportunities and public access over the next 10-15 years. It includes DNR’s recreation program goals, and identifies priorities for implementation. This plan will be evaluated periodically as part of adaptive management, and changes will be made as necessary to ensure compatibility with trust obligations and forest management objectives.\n\nConcept Map\n\nOne key outcome of the planning process is the development of a recreational use concept map (see Figure 3) for The Recreation Planning Area. The map reflects the general locations of proposed recreation management concepts within The Recreation Planning Area. DNR developed the concept map with involvement and feedback from the Recreation Planning Committee and the public. The concept map is based on broad scale mapping information. Exact locations and site specific details related to proposed projects will be generated from on-the-ground site assessments to ensure safety, sustainability, and a positive user experience consistent with trust obligations.\n\nThis concept map shows the general locations related to what is proposed for the next 10-15 years as the plan is implemented.\nFigure 3. Recreational Use Concept Map\nObjectives and Strategies\n\nAnother key outcome of the recreation planning process is a list of recreation management objectives and strategies for The Recreation Planning Area. These objectives and strategies describe in further detail the proposed recreation concepts and how they may be implemented and managed. Implementation of proposed projects is subject to the availability of funding, staffing and consideration of maintenance and operations funding.\n\nRecreation Planning Sub-Areas\n\nDue to the dispersed nature of the units of trust lands in The Recreation Planning Area, Sub-Areas (see Figure 4) were created as part of this recreation plan to assist in associating specific objectives and strategies with particular locations or landscape features. Recreation Planning Sub-Areas describe geographic sections and the primary management objectives (PMOs) of The Recreation Planning Area (see Table 1). Sub-Areas are not intended to reflect official boundaries. The sub-areas not listed in Table 1 will still allow dispersed recreation.\n\nThis is a broad-scale planning effort and includes a non-project level environmental review in compliance with the State Environmental Policy Act (SEPA). In the future, as this plan is implemented, there will additional project specific work such as site-specific assessments, field reconnaissance and inventory work, and detailed facility and trail design work. During implementation, individual projects will be subject to applicable regulatory procedures and practices. Processes referred to in these objectives and strategies are in addition to and do not replace current regulatory processes and procedures. At that time there will be additional environmental review in compliance with SEPA and opportunities for public involvement.\n\nTable 1. Recreation Planning Sub-Area Designations\n\n
\n\n
\n
Recreation Planning Sub-Area Designation
\n
Primary Recreation Management Objectives
\n
\n\n\n
\n
Red Mountain Unit: Portions of the Red Mountain block of trust land
\n
Non-motorized recreation
\n
\n
\n
North Fork Unit: Portions of the North Fork block of trust land
\n
Non-motorized recreation
\n
\n
\n
Stewart Mountain Unit: Portions of the Stewart Mountain block of trust land
\n
Non-motorized recreation
\n
\n
\n
Mirror Lake Unit: Portions of the northern Mirror Lake block of trust land
\n
Non-motorized recreation
\n
\n\n
\nFigure 4. Recreation Planning Sub-Areas\nPublic Access\n\nThe forest road system was built for the purpose of supporting working forests. These forest roads provide access into DNR-managed lands and are maintained for timber management purposes. These roads also serve as the primary means of public access to the Red Mountain, North Fork, Stewart Mountain and Mirror Lake units of The Recreation Planning Area.\n\n**Entire Planning Area**\n\n**Objective A:** Look for opportunities to provide public access to each recreation development zone in The Recreation Planning Area as compatible with timber management.\n\n**Strategies**\n1. Work with private property owners in an effort to secure public access rights onto forest roads that access the recreation development zone in the Stewart Mountain Unit.\n2. Maintain public access into the Red Mountain Unit and the North Fork Unit.\n3. Integrate marbled murrelet conservation strategies for the North Fork Unit into recreation access to development zones.\n\n**Objective B:** Use existing forest roads whenever appropriate to provide public access into recreation development zones.\n\n**Strategies**\n1. Inventory forest roads that could potentially provide access into the various units of The Recreation Planning Area.\n2. As needed, identify locations where new roads could be developed to access proposed trailhead locations.\n3. Project proposals will include forest road options, public safety considerations, cost benefit analysis and mitigation strategies that take into account year round working forest activities.\n\n**Objective C:** Where reasonable, establish and maintain roads to each trailhead location to a level that is appropriate to the needs for vehicular access.\n\n**Strategies**\n1. Develop criteria for access roads into recreation development zones that fits into the primary management activities on DNR-managed lands.\n2. Bring existing roads up to standards established to provide appropriate access to each trailhead location.\n3. Develop a long-term sustainable maintenance program to maintain access roads, while addressing forest practices maintenance issues.\n4. Identify funding methods to implement appropriate staffing maintenance and operations programs.\n\n**Recreation Trails**\n\nA main component of all trail projects will include an evaluation a) of existing undesignated\ntrails within the units planned for recreation development (Red Mountain, North Fork, Stewart Mountain and Mirror Lake units) for sustainability and user experience, and b) planning new trails that are sustainably located and built to provide a safe recreation experience without compromising environmental and resource health. New trail systems are a dynamic element across many landscapes; integrating trail planning and forest management activities provides an opportunity to respond to the changing nature of the working forests. Trail work will include restoring areas with known resource and environmental damage, relocating and developing trails in long-term sustainable locations, and restoring former trail locations.\n\nThe Recreation Program statewide coordinates with forest management activities when planning trail systems. This ensures the response to current and future management activities, including timber harvests that may impact trails, is managed appropriately. The dynamic nature of our forests mean that trails may be temporarily closed or re-routed in response to our agency’s vital mission to generate revenue for the trust beneficiaries.\n\n**Entire Planning Area**\n\n**Objective A:** Provide and maintain a network of safe, enjoyable and sustainable non-motorized recreation trails consistent with the following strategies based on available staffing, funding and resources.\n\n**Strategies**\n\n1. When planning for and locating future trails, inventory existing undesignated, non-sanctioned trails to determine extent of resource and environmental damage and the potential for reuse as part of a designated trail system.\n2. Develop a coordinated systematic approach to adding new trails where appropriate, decommissioning and/or restoring old locations simultaneously.\n3. Provide separate use trails where appropriate for safety of users and user experience.\n4. Design and locate designated trails consistent with DNR’s standards, stewardship responsibilities, suitability criteria, safety and risk management, and user experience.\n5. Create and maintain trail systems that minimize long-term maintenance and prevent or minimize the potential for erosion and sediment delivery into nearby streams and water bodies.\n6. Establish Trail Management Objectives (TMOs) for the designated trails; TMO’s describe standards for planning, construction, and maintenance of new trails and trail segments.\n7. Provide trail lengths, loops, and destination trails that create a range of trail experiences.\n8. Where practical, locate trails away from adjacent private property boundaries.\n9. Establish a trails working group that includes representatives from interested user groups and local residents to provide ongoing input and participate in trail planning, design, group events and maintenance.\n10. Consider and pursue a range of maintenance funding opportunities for trails including partnerships, commercial agreements, permits and fees.\n\n**Objective B:** DNR is willing to participate in trail planning, for example, on the Whatcom County conceptual Bellingham – Mt. Baker Trail, that may result in trail development on DNR lands.\nland should another state agency, local government body, or organized group of individuals convene a planning committee of stakeholders.\n\n**Strategies**\n1. Work with land managers (public and private) and stakeholders to participate in public input driven planning processes that include DNR land.\n2. As these opportunities are presented, engage with necessary parties to encourage the design and development of non-motorized trails that are consistent with DNR’s standards, stewardship responsibilities, suitability criteria, safety and risk management, and user experience.\n\n**North Fork Unit, Red Mountain Unit, Mirror Lake Unit and Stewart Mountain Unit**\n\n**Objective C:** Provide non-motorized trail opportunities for horseback riding, hiking and mountain biking based on available staffing, funding and resources.\n\n**Strategies**\n1. Inventory and evaluate the non-motorized trail zones identified on the Concept Map (Figure 3) for a non-motorized trail system.\n2. Partner with the public to identify trail location options.\n3. Work to plan, design and develop a variety of non-motorized trails for hiking, horseback riding and mountain biking.\n\n**Objective D:** Provide non-motorized trail connections to Whatcom County parks – Lake Whatcom Park, Canyon Lake Community Forest and Silver Lake Park, based on available staffing, funding and resources.\n\n**Strategies**\n1. Work (establish partnership) with Whatcom County Parks and Recreation Department, to identify potential linkage routes for connecting to existing and proposed county trails in Lake Whatcom Park, Canyon Lake Community Forest, and Silver Lake Park.\n2. Evaluate areas that could be suitable for locating multi-use trail connectors.\n3. Design and develop trails with compatible connections to county trails.\n\n**Objective E:** Provide non-m", "num_tokens": 2048}
{"category": "olmocr_science_pdfs-travel_and_tourism", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/olmocr_science_pdfs-travel_and_tourism/part-00-00000.npy", "text": " MoE. The differences in interpretation have created uncertainty and frustration among involved parties, which have not contributed to efficiency. For the present set-up to work, a better coordination and alignment of interests and priorities between the main stakeholders (UNESCO and MoE) must be ensured.\n\nGenerally speaking, however, many interviewees note that a foundation is probably an efficient institutional set-up for a Nordic C2 Centre. The benefits of being a foundation versus the same work being put under a government ministry, is that an organization can act more independently and decisively, and be spared (reportedly often extensive) bureaucratic processes reflecting the rules and regulations for public administration. On the other hand, placing the same tasks and funding under a ministry would allow for synergies. The relevant Norwegian institutions would be the Directorate for Cultural Heritage, the Environmental Agency or a research organisation. The Nordic network that NWHF has is also available for these actors, as well as international contacts. The Directorate already works with international parties through bilateral projects, and can for instance use them to assist in nomination processes and Periodic Reporting. Such organisations could also maybe do a better work on supplying Nordic expertise internationally, given that they can be supposed to have a better, and updated, overview over existing competence. The marginal costs of expanding the Directorates international work would probably be lower than the funding of NWHF, given that it is possible to employ 3-4 persons within the same organisation and localities as today. Such a solution would guarantee MoE a better control of the use of these resources. However, one would no longer have a C2 Centre for the Nordic-Baltic region. Moreover, the flexibility and independence that NWHF provides would be lost with such a solution. In terms of efficiency, there are drawbacks and benefits that are difficult to quantify to the alternatives of placing the mandated tasks of NWHF in a foundation or under a ministry.\n\nTo transfer the funding to a research organisation could also prove difficult since the work of NWHF cannot be classified as research and hence could be incompatible with the statutes of the potential research organisation. It would also not necessarily solve the problem of lacking steering control for MoE.\n4.3.5 Funding arrangements\n\nThe basic funding for the running of the secretariat and the board comes from MoE, see chapter 2.6. In addition projects have been funded by external funders, mainly MFA, but also FK Norway and Government of Switzerland in the present period. MoE also offers grants to seminars, conferences etc. as supplements to the basic grant to the Secretariat. Most of the project funds are being transferred to cooperation partners, while some are being used to cover travel and other expenses, for instance extra staff, in connection with the project in question.\n\nBasic funding subject to National Budget regulations\n\nThe Agreement requires that the Norwegian government grants NWHF at least NOK 3.5 million per year, but for the whole period the basic funding has been above, with 1.5 million for all years except 2012 when the funding was reduced to NOK 4 million. The yearly grant is being decided in the National Budget, and is as such affected by the yearly governmental budget discussions and priorities. This renders some uncertainty for NWHF, since the Governmental budget is not being public before October, an uncertainty that was highlighted for the budget year 2012. Being presented for a 20 per cent cut in the funding from MoE on rather short notice NWHF was forced to implement cuts in their own budget, including moving to cheaper offices, non-renewal of one staff member’s contract and drawing on the Foundation’s retained equity to balance the budget. But given the regulations for the National Budget it is not possible to secure grants for more than one year ahead, except the amount that is decided in the agreement. This is a situation all grant recipients has to adapt to, and plan in accordance to. It is also noteworthy that the operating costs in 2012 were higher than in preceding years, for instance with higher travel expenses. This indicates that the reduction in the funding was not fully reflected in the operation of NWHF.\n\nPossibilities for extra payment\n\nThe board has agreed to give the secretariat the possibility to invoice payment for services provided, for instance to governmental partners and WH site managers on work related to Periodic reporting. This possibility should however not be used for “basic” services. So far this opportunity has not been used by the secretariat, partly due to unclear delimitation of when to apply this payment (what is basic services?) and partly due to the extra work this will require from the secretariat.\n\nContribution from the other Nordic countries\n\nNWHF has a Nordic dimension and one could therefore ask why the other Nordic countries should not contribute to funding the foundation. If they find NWHF useful there should be some willingness to pay in order to keep the foundation running.\n\nAt present NWHF covers all travel costs for the board members in connection with board meetings (but no allowances). This is common practice for boards, but one could argue that the other Nordic members should pay for this themselves. And to our knowledge at least one of the board members does not always send the travel expense bill to NWHF.\n\nAt the same time the Nordic board members (and hence their governments) contribute in kind, varying from 4-15 working days per year according to our informants in the board. In addition they contribute with knowledge to the foundation.\nAnother consideration is that for this kind of cooperation, both within the UN system and Nordic Council of Ministers, it is commonly agreed upon that the country hosting the institute also provides the core funding.\n\n_Funding UNESCO directly_\n\nMost of the interviewees agree that donating NOK 4-5 million directly to the WH Fund or WHC would most probably is less cost-effective than today’s system. UNESCO is a large and bureaucratic organisation, not always being perceived as effective (ref. Norad 2009). And in addition NOK 4-5 million will run the risk of being used on other issues than WH or not in accordance with the WH policies of the Norwegian Government. This would rather be a donation than a grant, limiting the steering control for the government. The intended Nordic perspective would most certainly be lost with such a donation. In this assessment it is also important to take into account that NWHF is independent, and hence more flexible. The foundation can relieve WHC in Paris, i.e. give a benefit for UNESCO that probably is higher than UNESCO receiving the same amount directly. On the other hand, providing a few good extra staff through NWHF does not in itself really provide a sustainable long-term contribution to WH work.\n\n_Cost-efficiency_\n\nHaving no other organisation to benchmark with it is difficult to conclude whether the running of NWHF is cost-effective or not. The large spending’s on travel are however a potential issue. According to NWHF the travelling all are related to processes directly related to the Strategic Objectives, and upon request/invitation from the Nordic-Baltic States Parties or UNESCO HQ and regional offices. In addition, NWHF participate in the annual WH Committee meetings. But focusing the work on being a focal point the travelling of the secretariat would most likely decrease.\n\n**4.3.6 Resource implications for UNESCO of interaction with NWHF**\n\nAs mentioned earlier, the budget crisis within UNESCO has led the organization to utilize Category 2 Institutes and Centres more to conduct its work. At the same time, UNESCO is aware that interacting with the increasing number of Category 2 Institutes and Centres implies transaction costs. UNESCO staff now must record on SISTER (UNESCO’s Intranet-based monitoring tool) costs and time related to interactions with all Category 2 Institutes and Centres. According to the “Report on the full cost of Category 2 institutes and Centres” of April 2013\\(^{22}\\), the average cost per institute/centre during the 2012/2013 biennium ranged from $10,000 to $30,000, with an average cost of just under $20,000. UNESCO would not reveal the cost of particular Category 2 Institutes and Centres, so it is difficult to see how NWHF compares with others. In any case, the report notes that higher costs “do not necessarily represent higher administrative costs, but rather a higher degree of substantive cooperation between the Secretariat and the institutes/Centres concerned around concrete activities” (3b). In other words, a high “cost” may simply indicate a high degree of cooperation.\n\nAccording to a document reviewing progress so far in implementing recommendations from IOS’ joint audit and evaluation of the management framework of Category 2 Institutes and Centres, transaction costs for UNESCO in dealing with Category 2 entities.\n\n---\n\n\\(^{22}\\) 191 EX/14.1INF, 9 April 2013.\ninclude the following: “conducting feasibility studies for proposed Category 2 entities, participation of UNESCO staff in Category 2 governing boards, liaising and engaging with a burgeoning number of institutes and Centres, and conducting the review assessments…prior to the renewal of agreements.”\n\nIt would seem that most of the direct costs mentioned have already been covered by NWHF for some time. For example, The 2007 Evaluation of the NWHF noted that “the work of the NWHF has no financial implications [for UNESCO] and travel to Board meetings is covered by NWHF”. It should also be noted that the direct costs of the present review are being borne by the NWHF, though this does not cover the time accorded by UNESCO staff.\n\nIn interviews with WHC one question concerned whether their transaction costs were reasonable compared to the value received from NWHF, and compared to the transaction costs associated with other Category 2 Institutes and Centres.", "num_tokens": 2048}
{"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " in an agent to correspond to a small change in the agent’s policy. This is particularly important since other agents will be implementing continuous functions on agents, and we would like any continuous function on policies to be able to be considered valid continuous function on agents. We also want $$f$$ to be surjective. This means that our space of agents is sufficiently rich that for any possible continuous policy, there is an agent in our space that implements that policy. In order to meet all these criteria simultaneously, we need a space $$X$$ of agents, and a continuous surjection $$f:X\\rightarrow[0,1]^X$$. Unifying Fixed Point Theorems: While we are primarily interested in the above motivation, there is another secondary motivation, which may be more compelling for those less interested in agent foundations. There are (at least) two main clusters of fixed point theorems that have come up many times in decision theory, and mathematics in general. First, there is the Lawvere cluster of theorems. This includes the Lawvere fixed point theorem, the diagonal lemma, and the existence of Quines and fixed point combinators. These are used to prove Gödel’s incompleteness Theorem, Cantor’s Theorem, Löb’s Theorem, and achieve robust cooperation in the Prisoner’s Dilemma in modal framework and bounded variants. All of these can be seen as corollaries of Lawvere’s fixed point theorem, which states that in a cartesian closed category, if there is a point-surjective map $$f:X\\rightarrow Y^X$$, then every morphism $$g:Y\\rightarrow Y$$ has a fixed point. Second, there is the Brouwer cluster of theorems. This includes Brouwer’s fixed point theorem, The Kakutani fixed point theorem, Poincaré–Miranda, and the intermediate value theorem. These are used to prove the existence of Nash Equilibria, Logical Inductors, and Reflective Oracles. If we had a topological space and a continuous surjection $$X\\rightarrow[0,1]^X$$, this would allow us to prove the one-dimensional Brouwer fixed point theorem directly using the Lawvere fixed point theorem, and thus unify these two important clusters. Thanks to Qiaochu Yuan for pointing out the connection to Lawvere’s fixed point theorem (and actually asking this question three years ago). Partial Progress: Most Diagonalization Intuitions Do Not Apply: A common initial reaction to this question is to conjecture that such an $$X$$ does not exist, due to cardinality or diagonalization intuitions. However, note that all of the diagonalization theorems pass through (some modification of) the same lemma: Lawvere’s fixed point theorem. However, this lemma does not apply here! For example, in the category of sets, the reason that there is no surjection from any set $$X$$ to the power set, $$\\{T,F\\}^X$$, is because if there were such a surjection, Lawvere’s fixed point theorem would imply that every function from $$\\{T,F\\}$$ to itself has a fixed point (which is clearly not the case, since there is a function that swaps $$T$$ and $$F$$). However, we already know by Brouwer’s fixed point theorem that every continuous function from the interval $$[0,1]$$ to itself has a fixed point, so the standard diagonalization intuitions do not work here. Impossible if You Replace $$[0,1]$$ with e.g. $$S^1$$: This also provides a quick sanity check on attempts to construct an $$X$$. Any construction that would not be meaningfully different if the interval $$[0,1]$$ is replaced with the circle $$S^1$$ is doomed from the start. This is because a continuous surjection $$X\\rightarrow (S^1)^X$$ would violate Lawvere’s fixed point theorem, since there is a continuous map from $$S^1$$ to itself without fixed points. Impossible if you Require a Homeomorphism: When I first asked this question I asked for a homeomorphism between $$X$$ and $$[0,1]^X$$. Sam Eisenstat has given a very clever argument why this is impossible. You can read it here. In short, using a homeomorphism, you would be able to use Lawvere to construct a continuous map that send a function from $$[0,1]$$ to itself to a fixed point of that function. However, no such continuous map exists. Notes: If you prefer not to think about the topology of $$[0,1]^X$$, you can instead find a space $$X$$, and a continuous map $$h:X\\times X\\rightarrow[0,1]$$, such that for every continuous function $$f:X\\rightarrow[0,1]$$, there exists an $$x_f\\in X$$, such that for all $$x\\in X$$, $$h(x_f,x)=f(x)$$. Many of the details in the motivation could be different. I would like to see progress on similar questions. For example, you could add some computability condition to the space of functions. However, I am also very curious which way this specific question will go. This post came out of many conversations, with many people, including: Sam, Qiaochu, Tsvi, Jessica, Patrick, Nate, Ryan, Marcello, Alex Mennen, Jack Gallagher, and James Cook.\n\n by Marcello Herreshoff 230 days ago | Jessica Taylor, Scott Garrabrant and Stuart Armstrong like this | link From discussions I had with Sam, Scott, and Jack: To solve the problem, it would suffice to find a reflexive domain $$X$$ with a retract onto $$[0, 1]$$. This is because if you have a reflexive domain $$X$$, that is, an $$X$$ with a continuous surjective map $$f :: X \\rightarrow X^X$$, and $$A$$ is a retract of $$X$$, then there’s also a continuous surjective map $$g :: X \\rightarrow A^X$$. Proof: If $$A$$ is a retract of $$X$$ then we have a retraction $$r::X\\rightarrow A$$ and a section $$s::A \\rightarrow X$$ with $$r\\circ s = 1_A$$. Construct $$g(x) := r \\circ f(x)$$. To show that $$g$$ is a surjection consider an arbitrary $$q \\in A^X$$. Thus, $$s \\circ q :: X \\rightarrow X$$. Since $$f$$ is a surjection there must be some $$x$$ with $$f(x) = s \\circ q$$. It follows that $$g(x) = r \\circ f(x) = r \\circ s \\circ q = q$$. Since $$q$$ was arbitrary, $$g$$ is also a surjection. reply\n by Jessica Taylor 234 days ago | Vadim Kosoy likes this | link If I were studying this, I would be looking at domain theory, in which (among other things) there has been found a topological space $$X$$ homeomorphic with $$X^X$$. The page I linked links to some notes at the bottom. (h/t Qiaochu for pointing out domain theory) reply\n by Stuart Armstrong 231 days ago | Scott Garrabrant likes this | link Can you argue that $$X$$ must have a semi-metric compatible with the topology by using $$d(x,y)=sup_{z\\in X}|h(x,z)-h(y,z)|$$? I’m wondering if you can generalise this to some sort of argument that goes like this. Using X, project down via $$\\pi$$ from $$X^0=X$$ to $$X^1=X^0/d$$. Let $$\\phi$$ be our initial surjection; it’s now a bijection between $$X^1$$ and maps from $$X^0$$ to $$[0,1]$$. If the projection is continuous, then every map from $$X^1$$ to $$[0,1]$$ lifts to a map from $$X^0$$ to $$[0,1]$$. Restricting to the subset of maps that are lifts like this, and applying $$\\phi^{-1}$$, gives a subset $$X^2 \\subset X^1$$. We now have a new equivalence relationship, maps from $$X^1$$ that are equal to each other on $$X^2$$. Project down from $$X^2$$ by this relationship, to generate $$X^3$$. Continue this transfinitely often (?) to generate a space $$X'$$ where $$\\phi$$ is a homeomorphism, and find a contradiction? This feels dubious, but maybe worth mentioning… reply\n by Alex Mennen 231 days ago | Scott Garrabrant and Stuart Armstrong like this | link I haven’t checked that argument carefully, but that sounds like it should give you $$X'$$ with a continuous bijection $$\\phi:X'\\rightarrow[0,1]^{X'}$$, which might not necessarily be a homeomorphism. reply\n by Stuart Armstrong 231 days ago | link Yes, you’re right. reply\n by Stuart Armstrong 230 days ago | Scott Garrabrant likes this | link A small note: it’s not hard to construct spaces that are a bit too big, or a bit too small (raising the possibility that a true $$X$$ lies between them). For instance, if $$I$$ is the unit interval, then we can map $$I$$ onto the countable-dimensions hypercube $$I^\\omega$$ ( https://en.wikipedia.org/wiki/Space-f", "num_tokens": 2048}
{"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": " $\\pm 1$ inputs, we work below over the ideal generated by $\\{x_i^2 - 1\\}$.\nWe prove by induction on $n$ that if $P/Q$ represents parity of length $n$ then $PQ = \\alpha \\prod_{i=1}^n x_i + \\cdots$ for some positive $\\alpha$, where the dots represent lower degree terms. This implies that $\\deg P + \\deg Q \\geq n$. The claim is clearly true for $n = 0$. Now consider $$\\frac{P}{Q} = \\frac{x_nP_1+P_2}{x_nQ_1+Q_2},$$ where $P_1,P_2,Q_1,Q_2$ are over $x_1,\\ldots,x_{n-1}$. Substituting $x_n=\\pm1$ and applying the induction hypothesis, we deduce that for some $\\alpha,\\beta > 0$, \\begin{align*} (P_1+P_2)(Q_1+Q_2) &= \\alpha \\prod_{i=1}^{n-1} x_i + \\cdots, \\\\ (P_1-P_2)(Q_1-Q_2) &= -\\beta \\prod_{i=1}^{n-1} x_i + \\cdots. \\\\ \\end{align*} Subtracting both equations, we get $$P_1 Q_2 + P_2 Q_1 = \\frac{\\alpha+\\beta}{2} \\prod_{i=1}^{n-1} x_i + \\cdots.$$ Therefore $$PQ = (x_nP_1+P_2)(x_nQ_1+Q_2) = x_n(P_1Q_2+P_2Q_1) + \\cdots = \\frac{\\alpha+\\beta}{2} \\prod_{i=1}^n x_i + \\cdots.$$<|endoftext|># NASA pictures of dark matter collisions\n\n1. Mar 27, 2015\n\n### Staff: Mentor\n\nhttp://www.nasa.gov/press/2015/marc...that-may-help-identify-dark-matter/index.html\n\nThe take away seems to be that some ideas about dark matter may have problems. The possibilities checklist of dark matter interactions has been shortened.\n\nThere are some really great pictures of galactic halos in colliding galaxies. Which make looking at the link a must. IMO.\n\n2. Mar 27, 2015\n\n### Greg Bernhardt\n\nWhat about the hubble telescope makes the image blue?\n\n3. Mar 27, 2015\n\n### Chalnoth\n\nThe blue blobs are estimates of the mass of the galaxy cluster by examining the distortions of galaxies behind the cluster due to the cluster's gravity.\n\n4. Mar 27, 2015\n\n### marcus\n\nhttp://arxiv.org/abs/1503.07675\nThe non-gravitational interactions of dark matter in colliding galaxy clusters\nDavid Harvey, Richard Massey, Thomas Kitching, Andy Taylor, Eric Tittley\n(Submitted on 26 Mar 2015)\nCollisions between galaxy clusters provide a test of the non-gravitational forces acting on dark matter. Dark matter's lack of deceleration in the bullet cluster collision' constrained its self-interaction cross-section \\sigma_DM/m < 1.25cm2/g (68% confidence limit) for long-ranged forces. Using the Chandra and Hubble Space Telescopes we have now observed 72 collisions, including both major' and `minor' mergers. Combining these measurements statistically, we detect the existence of dark mass at 7.6\\sigma significance. The position of the dark mass has remained closely aligned within 5.8+/-8.2 kpc of associated stars: implying a self-interaction cross-section \\sigma_DM/m < 0.47 cm2/g (95% CL) and disfavoring some proposed extensions to the standard model.\n5 Pages, 4 Figures and 18 pages supplementary information\nScience, Vol 347, Issue 6229 (2015)\n\n5. Mar 27, 2015\n\n### wabbit\n\n6. Mar 27, 2015\n\n### Staff: Mentor\n\nWhat exactly does this mean?\n\n7. Mar 27, 2015\n\n### marcus\n\nHi! It's interesting how they map invisible mass concentrations using so called \"weak lensing\" of background shapes. I know you're familiar with this but someone new to it might not be.\n\nBackground shapes get \"squashed\" in the direction of increasing mass. Circles become ellipses elongated in the direction perpendicular to where the mass is. So the short axis of the ellipse, the \"minor axis\" will tend to be aligned along the mass gradient. So they can actually produce contour maps of the distribution of invisible mass.\n\nStatistical methods are needed because the background shapes are not perfect circles. They are roughly circular galaxies but tilted randomly so that they appear ellipses oriented in random directions. As their light comes to us, passing the mass concentration, there is a further elongation or, to put it another way, squashing of the shapes.\n\nLast edited: Mar 27, 2015\n8. Mar 27, 2015\n\n### Chalnoth\n\nIf you have one particle of dark matter passing through a cloud of dark matter particles, this cross section gives the expected distance before the dark matter particle is deflected.\n\nThe mass is a part of the calculation because the particle mass determines how many particles there are (we know how dense the dark matter is, but a dark matter particle with half the mass would require twice as many particles to make up that same density).\n\n9. Mar 27, 2015\n\n### marcus\n\nIf DM particles had a substantial collision cross section (non gravitational interaction) then two clouds could bump, and cancel each others momentum. So a larger cloud would remain at the site of the collision.\nBut for example in the \"bullet cluster\" collision where two clusters collided the two DM clouds basically just passed through each other and came out the other side. The ordinary matter galaxies did likewise because they were scattered so sparsely in the cluster that they had very little chance of colliding.\n\nBut the collision left a cloud of hot hydrogen gas in the middle, radiating Xray. Because the intergalactic medium hydrogen did have a substantial interaction cross section. Those clouds could collide and cancel each other's momentum and accumulate at the site of the collision.\n\nWhen clusters collide the stars and dark matter particles pass through freely. Only the intergalactic medium, the ordinary (hot, partly ionized) gas, actually crashes.\n\nLast edited: Mar 27, 2015\n10. Mar 27, 2015\n\n### wabbit\n\nI was impressed by what seems to be very precise post-treatment of the image to correct for residual aberrations (off-axis astigmatism it seems from how they describe it) in Hubble's optics (figure S4, p.8, supplementary material). This might otherwise interfere with their interpretation of the image I presume, for smaller galaxy images.\n\nLast edited: Mar 27, 2015\n11. Mar 27, 2015\n\n### wabbit\n\nI was aware there was distortion but not really of its precise shape, thanks for the explanation.\n\n12. Mar 29, 2015\n\n### SpiderET\n\n13. Mar 29, 2015\n\n### wabbit\n\nI would read it more as a measurement of dark matter properties (well, that's not much of a stretch given that this is how the experiment is constructed and reported). There aren't so many of these as far as I know, and more are needed to narrow down the search for what it might be. Excluding some of the proposed models sounds like excellent news for this search.\n\nI see arstechnica titles \"strongest case yet for dark matter\". I need to read it now, not seeing yet why it adds so much to the case given that the evidence was already pretty strong. Edit : not sure the article really supports the title, but it's a well done piece, thanks for the link.\n\nLast edited: Mar 29, 2015\n14. Mar 29, 2015\n\n### Chalnoth\n\n15. Mar 29, 2015\n\n### SpiderET\n\nSomehow I cant copy text from the pdf, but in the preprint on page 1 and 2 is written, that interacting particles would solve some problems of incorrect predictions of Lambda CDM model. But this paper has shown that the particles dont interact.\n\nBut personally I would go even further. This dark matter has strange properties, it interacts gravitationally with normal matter but it doesnt interact gravitationally with other dark matter? Seems like another sign that we need new theory which will include some extended or modified gravity theory.\n\n16. Mar 29, 2015\n\n### Chalnoth\n\nIt hasn't shown that they don't interact. It's placed an upper limit on how strongly they can possibly interact. While there are models where dark matter particles have no interactions except through gravity, most models have dark matter that interacts weakly with itself and with normal matter.\n\nYes, dark matter interacts gravitationally with other dark matter. By \"doesn't interact\" they're talking about the", "num_tokens": 2048}
{"category": "rpj-proofpile-arxiv", "path": "/workspace/public/Data/OLMO-3/tokenize_space/qwen_output/rpj-proofpile-arxiv/part-00-00000.npy", "text": ".\n\nFinal corrections\nBefore you send or print you document check whether there are hyphens you find inappropriate and remove them.\n\nWhat about aligning text on websites?\nOne of the major flaws of the html standard is that the internet community never has come up with a satisfactory solution for hyphenation. Some browsers accept soft hyphens, but it remains a mess. The complication for the implementation of hyphenation in html text is of course that html text is supposed to look nicely to the reader whatever the width of the window he has opened for displaying the text.\n\nJustifying html text means you have to give up automatic wrapping with varying window width. Just use flush left and manually put hard returns (html tag: ) at the position you want to break the sentences. If you wish you can include hard hyphens there. There are several drawbacks with this beautifying of your web text: (i) it does not wrap with the window size, (ii) you cannot reuse the text because you will have to remove al the line breaks, and (iii) if you want to edit the text, or change its width, you have to remove all earlier inserted line breaks and insert new ones.\n\nYou will have to show your text as a pdf file if you really want to have text on your web site with a professional look.\n\nCentering text is always wrong.\n[CR_show_voting_stars_handler]\n\n- - - - - -\nIf you like this post why don't you email subscribe to our new posts. Or subscribe to our RSS feed.\n1. 7 Dec 2009 17:01, Dmitry\n\nHi\n\nThe EquPixy 2.1 add-in for Microsoft Word (MS Windows) will help you to work with mathematical and chemical formulas and equations. Its functions allow converting mathematical formulas written in one line into a formula with rigorous numerals, denominations, radicals and degrees with only one key stroke. The figures that designate the number of atoms in chemical formulas are automatically converted into subscripts, and the ion charge numbers and atom oxidation degrees are converted into superscripts. The function of writing a capital or lowercase letter depending on the length of pushing down the keyboard key is available for writing chemical elements; if you push down and immediately release the key, a capital letter is written, if you push down the key and hold it for a second a lowercase letter is written. The EquPixy add-in has the ability of checking the validity of chemical equations for the required number of elements on their right and left sides. Other useful functions are also available. For example, the generation of an arrow with indication of reaction conditions, etc.\n\n2. 7 Dec 2009 22:07, Klaas Wynne\n\nI think Word is great and I also think that centred text can be great. The noble prize certificate is centred and so is the title page of Newton’s Philosophiae Naturalis Principia Mathematica. The only thing that is always wrong is an arthritic view of what is right or wrong.\n\n3. 27 Jun 2010 7:45, foobar\n\nThank you!\n\nI didn’t know that word breaking was called “Hyphenation” and certainly not that it was available in word.\n\nI was always jealous of the LaTeX dudes getting so professional looking documents right out of the box. However, with your tips, I’m able to tweak Word 2010 documents to look somewhat semi-professional. =)\n\nThanks =)\n\n4. 3 Oct 2010 12:43, Hira Gillani\n\nMicrosoft Word is one of the most powerful and widely used word-processing software to create, edit, finalize and produce almost every type of documents. I often search the web in order to get my self more skilled and to get the maximum out of this leading word processing software. After reading this article I expect more informative posts from you in the near future. Thanks!\n\n5. 25 Oct 2010 7:07, Ian L\n\nCorel WordPerfect is so awesome. I still use it over MS Word.\n\n6. 25 Jun 2011 15:30, Aravind\n\nI am using windows xp with office 2003. ms word justifying only english. another languages does not justifying. what can I do for this problum?\n\n7. 24 Sep 2011 13:28, darcy\n\nThank you so much for your advice on selecting wordperfect justification in MS Word. It immediately improved my documents.\n\n8. 27 Sep 2013 19:50, Mark Larson\n\nI am using Word 2010. I would like to use full justification. However, I have one challenge with which I need help. If I insert a figure in the middle of a paragraph (inserted so that the figure will be at the top of the next page, I put a hard return in the middle of the sentence so that this line does not move to the next page. However, that line is not right justified. How can I right justify that line containing a sentence split by such a figure?\n\nXHTML: You can use these tags:\n