Dataset Viewer
Auto-converted to Parquet
id
stringlengths
32
32
image
imagewidth (px)
662
1.28k
gt
stringlengths
966
9.59k
bbox
stringclasses
1 value
attributes
stringclasses
3 values
d4a92c93e50ce3604467ceb30126d797
```markdown (for a review see Marien, Engelborghs, Fabbro, & De Deyn, 2001) and reading (Fiez & Petersen, 1998; Fulbright et al., 1999). Moving a step forward, Nicolson et al. (2001a) endorse the idea that a deficit involving cerebellar function is the underlying cause for the emergence of developmental dyslexia. Here the biological claim is that the dyslexic’s cerebellum is mildly dysfunctional and that a number of cognitive difficulties ensue. First, the cerebellum plays a role in motor control and therefore in speech articulation and it is postulated that retarded or dysfunctional articulation would lead to deficient phonological representations. Secondly, the cerebellum plays a role in the automatization of over-learned tasks, such as driving, typing, and reading (Nicolson et al., 2001a). Lately, there is great debate about this theory, with some researchers (e.g., Beaton, 2002) remaining skeptical in front of the contradicting data, and others (Ivry & Justus, 2001; Zeffiro & Eden, 2001) challenging the idea that a cerebellar lesion or dysfunction could be the main cause of developmental dyslexia, while offering possible explanations concerning other, mainly cerebral, brain areas (but see also Nicolson, Fawcett, & Dean, 2001b). The universality of a hypothesized cerebellar impairment in dyslexic children has been questioned. Several studies (Ramus, Pidgeon, & Frith, 2003; Ramus, Rosen, et al., 2003) found only a small proportion of dyslexics having even mild motor problems. These results led the above authors to conclude that there is not a causative relationship between cerebellar dysfunction and the most prominent feature of dyslexia, the phonological deficit. Ramus, Pidgeon, and Frith (2003) corroborate the idea that the high incidence of motor problems in dyslexics found in previous studies (Fawcett & Nicolson, 1999; Fawcett, Nicolson, & Dean, 1996; Fawcett, Nicolson, & Maclagan, 2001) is an artifact due to comorbidity with other developmental disorders such as ADHD. In support of these arguments, an alternative model (Ramus, 2003, 2004, in press) postulates that dyslexia emerges directly from a phonological deficit due to congenital anomalies in specific left perisylvian areas. This model also predicts the incidence of a cerebellar deficit modulated by genetic-dependent hormonal factors. Nevertheless, there is mounting evidence supporting the cerebellar deficit hypothesis. Several studies (Brookes & Stirling, 2005; Fawcett & Nicolson, 1999; Fawcett et al., 2001; Fawcett et al., 1996; Vlachos, Ioannou, & Mati-Zissi, 2004; Yap & Van der Leij, 1994) have found that dyslexic children show significant impairment during cerebellar tests. In addition, many neuroimaging studies indicate that there are significant alterations regarding the brain volume and neurological organization of the dyslexic readers (Brown et al., 2001; Eckert et al., 2003; Leonard et al., 2001; Rae et al., 2001), and, in many cases, these alterations were significantly correlated with literacy skills (Eckert; Rae). The above findings provide strong evidence of cerebellar abnormalities in the panel of dyslexic children. The first aim of the present study was to assess the cerebellar deficit hypothesis examining children’s performance in cerebellar and cognitive tasks associated with the dyslexic syndrome. Given the discrepant findings and the concern about a confound between dyslexia and attention deficit/hyperactivity disorder (ADHD), we included a group of ADHD children in this study, in order to examine the claim of Ramus, Pidgeon, and Frith (2003) that motor problems observed in dyslexics are due to the coexistence of dyslexia and ADHD. Based on the aforementioned studies, we expect to find dyslexic children to be significantly impaired during cerebellar and cognitive tasks (Hypothesis 1). The investigation of oral speech deficits in dyslexic children is prima facie paradoxical. By definition, dyslexia is strictly referred to reading and writing. Contrary to this definition, there have been studies showing impairment of dyslexic children in several ```
""
{"document_type": "Books", "task": "document_parsing"}
55c2b9483826d7e8364c146cee8a0a20
```markdown any exciting book or text to read, it is the easiest and quickest way to find something from the internet. The next choice was reading short stories (A: 82.9%, B: 50%, C: 70.4%, D: 36.6%) and as we can see there is one elite school and one regular school that like short stories more than the other elite school and regular school, so it is the teacher who partly may generate interest in reading certain kind of books. The interest in texts in computer games is higher in regular schools (A: 42.9%, B: 41%, C: 66.7%, D: 58.5%). The texts in computer games might be easier, that is why regular school children might like them. Unfortunately, I have no proof of that, because the games differ on their level. I have seen games where you have to read instructions and there are longer texts that flash very quickly and guide the player on their way. Children may get new vocabulary from the games as well if they read the texts through and do not just use a method of trial and error. Students of school A (65.7%) and B (54.2%) showed more interest in longer texts than C (11.1%) and D (31.7%). For schools with selective student in-take reading longer texts is more ordinary than for students of regular schools, where there are no additional subjects in English. Interest in reading longer texts even had higher percentages than computer games. But surprisingly, many schoolchildren liked to read blogs that seems to be a new trend in studying (A: 60%, B: 37.5%, C: 55.6%, D: 39%). See appendix 3, figure 1 to compare the results in table. There were some additional interests brought out under the open-ended comment section, for example one child from school A was searching texts for having better debating opportunities in class during discussion of some theme. Another one, probably a future IT student at the University of Tartu, liked to read about IT technology and especially hardware and software reviews. Students from the school designated with letter ```
""
{"document_type": "Books", "task": "document_parsing"}
b7c7bb065bf1e2084f8843db2f22ea6f
```markdown slopes retain moist conditions longer into the growing season than south-facing slopes, which is reflected in productivity and plant species. One consequence is that fire severity can vary substantially across topographic position, such as aspect or riparian proximity (Dillon and others 2011, Dwire and Kauffman 2003). The outcome for vegetation communities is that the spatial scales of drought-related mortality are related to the grain of topographic variation, or hillslope facets, in historical examinations (Hessburg and Agee 2003). The severity of the meteorological drought can, itself, have some influence on this patchiness, and topographic relationships to fire severity are damped in the driest years (Dillon and others 2011). Correlation of drought to other meteorological characteristics is an increasingly important area of study. If we look through the list of key dimensions, there is a sense of increasing levels of information or organization (sensu Blöschl 1996) of outcomes for drought events. At the basic level, there is the question of how dry it is (severity), followed by how dry an event is relative to other events (probability/frequency), followed by how quickly or slowly the moisture levels transition (temporal patchiness), and how different places within a landscape experience a given meteorological drought (spatial coherence). The next level of organization is how drought might relate to other factors of importance in ecology. In the following section, we discuss the linkage between temperature and drought because it has substantial relevance to the broad discussion on climate change and drought (Dai 2011, Sheffield and others 2012, Trenberth and others 2014), particularly in the context of forest ecology (Adams and others 2009, Allen and others 2010, Breshears and others 2005). The causal relationship between temperature and drought arises from interactions mediated by solar heating. Clearly, warmer air has lower relative humidity (given a fixed specific water content in the air), and warmer air has the capacity to impart more sensible heat to the energy balance. However, the great majority of the heat in the energy balance is incoming solar radiation. Some solar heating goes to evaporating water and some goes into heating soil, vegetation, and air. As a consequence, air temperature and evapotranspiration are correlated simply because they share the same driver (i.e., solar radiation), not because air temperature substantially adds to the energy available for evapotranspiration. This makes temperature a simple index for framing both the energy available for evapotranspiration and the capacity of air to hold additional moisture. For example, temperature is a variable in the Thornthwaite equation (Thornthwaite 1948), which is used in calculation of the PDSI. When there is less water available (due to a lack of antecedent precipitation), more of the incoming solar energy goes into raising temperature; however, when conditions are dry, the increase in temperature is at the expense of evapotranspiration. Energy goes into warming, not evaporating. Under dry conditions, temperature becomes an index of the lack of water available for evapotranspiration. Thus, within historic contexts, temperature can be used as an index of dryness: dry is warm, and warm is dry. Under a changing climate, in contrast, temperature will rise independently of aridity. Warmer temperatures will result from increased atmospheric emissivity and a changed energy balance of the air. Net radiation will increase, slightly increasing the energy available for evaporation, but the relationship between relative humidity (or vapor pressure deficit) and temperature for warming on that slow of a scale will not be the same as it is in current empirical contexts. In short, the correlation between air temperature and drought will still exist, but its value will not be in indexing drought conditions in relation to current conditions. Instead, warmer temperatures paired to drought will represent a greater challenge for plants to cope with drought (Adams and others 2009). This context of drought being warmer has been termed “global-change-type drought” (Breshears and others 2005) to reflect the idea that whether or not “drought” is worse under a changing climate, the consequences of a given level of drought could be worse in combination with warmer temperatures. Because warmer temperatures elevate metabolism and respiration, a higher productivity will be required to match the demand. As plants shut down during moisture stress, they will exhaust carbon stores more quickly, and survival times between wetting events will shorten. The physiological mechanisms underlying drought mortality are discussed in chapter 3. The correlation of drought to the season in which it occurs is another important characteristic that may also shift with warming. For example, if the period of common drought corresponds to the warm season (growing season), drought effects will be more severe, in a broad sense. Expansion of the growing season as temperatures warm could draw soil water down sooner as well, yielding deeper dryness in the soil earlier in the growing season; this would effectively increase ```
""
{"document_type": "Books", "task": "document_parsing"}
47c0a12e0366301a7162034fd75c149a
```markdown breakaway region of Abkhazia primarily in the service and production sectors, with the support of SIDA, DANIDA, SDC, EU and UNHCR. DRC has a sound knowledge of the local economic context and dynamics and strong capacity to provide training in the field of business management and administration. DRC's recognised presence in South East Georgia's breakaway region of Abkhazia since 2013 has translated into strong partnerships with local communities, economic and social actors and local institutions which are essential to run successfully the action and contribute to rural development. DRC has also developed an innovative programme to engage youth in the labour market and offer new educational possibilities based on market needs. Since 2016, DRC supports unemployed youth in the districts of Gali, Ochamchire and Tkvarcheli to work with SMEs by receiving on the job technical trainings and receiving grants at the end of the programme based on their business plans. DRC is currently the only international NGO providing on the job training to unemployed youths in underserved and remote districts of Georgia's breakaway region of Abkhazia. DRC will partner with Action against Hunger (ACF), which is the second largest NGO operational in Georgia's breakaway region of Abkhazia, able to operate on both sides of the divide with Georgia's breakaway region of Abkhazia. Benefitting from broad international support, it has been implementing projects in close collaboration with local communities, administrations, professionals, scientific institutions, universities and civil society. It has an active presence on both sides of the Administrative Border Line to Georgia's breakaway region of Abkhazia and good links with decision makers and responsible (de facto) authorities/institutions in all relevant locations. ACF has continuously implemented VET projects in Eastern Georgia's breakaway region of Abkhazia from 2007 to 2011 funded by UNHCR. With EU funding it has implemented the project “Vocational and Business Skills in Georgia's breakaway region of Abkhazia” in a consortium with World Vision, where ACF was leading the VET component of the joint project. ACF has extensive experience in implementing projects focusing on skills development, employment and entrepreneurship funded by the EU and SIDA. ACF's employment methodology, the “Employment Shuttle”, is acknowledged as a best practice by the European Commission in promoting social inclusion and employability of participants and it is already piloted in Georgia. ACF is also able to integrate a confidence building component where ethnic Abkhaz, Georgian, Armenian, Russian and other minorities establish linkages and networking within Georgia's breakaway region of Abkhazia. DRC is proposed as grant coordinator and ACF as co-beneficiary. Nevertheless, the organisations could be swapped in case the political situation would require. A third international NGO is present in Georgia's breakaway region of Abkhazia, World Vision, which has, in past times, worked on Business Skills in Georgia's breakaway region of Abkhazia but has since specialised on education issues. Should the situation justify it or should it prove favourable for the implementation of the action, World Vision would be associated to the action as further co-beneficiary for implementing a component of the action. (c) Essential selection and award criteria The essential selection criteria are the financial and operational capacity of the applicant. The essential award criteria are relevance of the proposed action to the objectives of the call; design, effectiveness, feasibility, sustainability and cost-effectiveness of the action. (d) Maximum rate of co-financing ```
""
{"document_type": "Books", "task": "document_parsing"}
4d7c7906133b5d70ac8ffe4751df9f52
```markdown Among the Stoics, the problem of aesthetics concerned existence. Through the emergence of Christianity, the problem of aesthetics became linked to the question of purity. The reason for taking care of your self was to keep your self pure. Physical integrity rather than self-regulation became important. The self was no longer something to be made (art of living) but something to be renounced and deciphered. In Christianity, writing becomes a test which ‘brings into light the movements of thought, it dissipates the inner shadow where the enemy’s plots are woven’ (Foucault, 2003b, p. 121). In other words, here, it is about finding the truth about one’s self as a way of accessing the light, which is accomplished by making visible one’s inner thoughts – disclosing one’s self. Previously, writing was about constituting the self by writing down the truths of the masters, and by keeping notebooks of deeds of the day, which were then meditated on. Disclosure of the self was during early Christian times conducted through the ritual of exomologesis – which ‘was a ritual of recognizing oneself as a sinner and penitent’ (Foucault, 2003a, p. 162). The bishop was asked to impose upon the individual the status of a penitent. This act in relation to the bishop was not a confession, only a ritual where the status of a sinner is made public and confirmed. The sinner was then, over a period of several years, required to make visible her/his sins through self-punishment, suffering, shame and humility. Here, we can see how what was private among the Stoics (meditating about the activities of the day), have become public. Through the ritual of exomologesis, the sinner erases her/his sins and restores the purity acquired through baptism, at the same time as her/his status as a sinner is confirmed. This ‘was not a way for the sinner to explain his sins but a way to present himself as a sinner’ (Foucault, 2003a, p. 163). This paradox of confirming the status as a sinner and erasing one’s sins at the same time was most commonly explained by the model of death, torture and martyrdom. With this model, the sinner would die rather than abandon her/his faith. She/he illustrates that she/he is able to renounce both life and the self. The difference between the Stoic and Christian traditions is that in the Stoic tradition examination of self, judgement, and discipline show the way to self-knowledge by superimposing truth about self through memory, that is, by memorizing the rules. In exomologesis, the penitent superimposes truth about self by violent rupture and disassociation. It is important to emphasize that this exomologesis is not verbal. It is symbolic, ritual, and theatrical (Foucault, 2003a, p. 164). During the fourth century, exagoreusis emerged as another technology for the disclosure of the self. Exagoreusis has to do with self-examination related to two principles of Christian spirituality: obedience and contemplation. Obedience for the monk was total obedience to the rules and the master, in comparison to the instrumental and professional relationship between the master and the disciple among the Stoics. In exagoreusis, every act conducted without the permission of the master is seen as a theft. This was about the sacrifice of the self, of the subject’s own will, which is a new technology of the self. ‘The self must constitute itself through obedience’ (Foucault, 2003a, p. 165). The second aspect is contemplation which is seen as the supreme good. It is the obligation of the monk to turn his thoughts continuously to that point which is God and make sure that his heart is pure enough to see God. The goal is permanent contemplation of God. This contemplation is directed towards present thoughts, not on past actions of the day as with the Stoics. The monk needs to scrutinize his thoughts to see which ones are directed towards God and which are not. The scrutiny of conscience consists of trying to immobilize consciousness, to eliminate movements of the spirit which diverts from God. That means we must examine any thought that presents itself to consciousness to see the relation between act and thought, truth and reality, to see if there is anything ```
""
{"document_type": "Books", "task": "document_parsing"}
1c318c3168e14a9575069cafdb42931f
```markdown C. Bilateral cooperation and national efforts 46. Adhering to strategies set forth in the national Plan of Action, Cambodia has built close relationship and cooperation with countries in the region and other international anti-drug agencies to control and suppress cross-border drug trafficking activities and exchange information and intelligence on drug trafficking suspects. Cambodia had bilateral meetings with Thailand and China as well as a trilateral meeting with Viet Nam and the Lao People’s Democratic Republic relating to drug matters. Law enforcement officers were trained at high-risk provinces along the borders of Thailand, the Lao People’s Democratic Republic and Viet Nam in collaboration with various national and international partners. Training on drug control and harm reduction was also provided. In addition, special training for law enforcement on drug control was also provided within the framework of MOU signed between Cambodia and Russia. DEA provided trainings on illicit drug information analysis and basic investigation to officers of the Cambodian law enforcement agency. In addition to its own national efforts to upgrade the capacity to prevent and suppress illicit drug trafficking, Cambodia repeatedly calls for non-governmental organizations, international community, UNODC, JICA and those partners with whom it had signed MOU to provide trainings to its law enforcers on human capacity-building and provision of technical equipment. 47. China held bilateral meetings with Cambodia, the Lao People’s Democratic Republic, Myanmar, Thailand and Viet Nam to promote bilateral cooperation on drug control to tackle the drug problems in the Golden Triangle. To also deal with the drug problems in the Golden Crescent, China also has bilateral cooperations with Afghanistan, Kazakhstan, Pakistan and Russia. Moreover, China has cooperation with Columbia. Moreover, China participated in the 2nd Senior Officials Meeting on drug control of Shanghai Cooperation Organization (SCO) to promote cooperation on drug control and contributed in the drafting of the Drug Control Strategy 2011-2016. 48. The Office of the Narcotics Control Board, Thailand conducts an International Narcotics Law Enforcement Training Course annually by getting the financial support from Thailand International Cooperation Agency (TICA). The trainees are law enforcement officers from countries in the Asia-Pacific region. Another annual international training course supported by the Drug Advisory Programme (DAP) of the Colombo Plan Secretariat is the Training Course on Precursors and Chemicals Control for ASEAN Narcotics Law Enforcement Officers. It was conducted in August 2011. The participants were from ASEAN member countries and some South Asian countries. Moreover, International Law Enforcement Academy (ILEA) of Thailand also provides training to drug law enforcement officers every year. A Workshop on ASEAN+3 (China, Japan and the Republic of Korea) Airports Interdiction Task Forces (AITF) was held in May 2012 and over 50 participants attended. 49. In 2011, cooperation between drug control agencies of Viet Nam and neighbouring countries had intensified and meetings were held on a regular basis between the drug control agencies of the provinces that share the border with those of the neighbouring countries. Viet Nam also assisted Cambodia and the Lao People’s Democratic Republic to build up capacity and exchange knowledge and experience in drafting the Drug Law. Since the signing of the agreement with ```
""
{"document_type": "Books", "task": "document_parsing"}
c0c8571584005a14e99fd93f4a7072c2
```markdown the expectation of acknowledgement (Smith et al., 2004; Linden et al., 2014). Greenleaf (1977) also highlighted, that servant leaders place the welfare and well-being of followers as a top priority (Yasir & Mohamad, 2015; Page & Wong, 2000). Parolini, Patterson and Winston (2009) and Stone and colleagues (2004) highlighted the core distinction between servant and transformational leadership as pertaining to the focus of the leader. Where transformational leaders are focussed on building commitment to the organisational vision and work to reach collective goals and objectives; servant leaders are focussed on serving the needs of the followers first and the achievement of organisational objectives is a secondary outcome (Stone et al., 2004). While transformational leaders are still concerned for their followers, the need to serve them is an overiding focus for servant leaders (Stone et al., 2004). The transformational leaders focus is directed to ensuring the organisation’s objectives are accomplished by working to build followers organisational commitment (Stone et al., 2004). Although both leadership styles have been around for a similar period of time, research on servant leadership is relatively scarce. As such, no one clear definition and operationalisation has been agreed upon. To this day there remain several models/measures of servant leadership, however all of them share a similar dimensional structure (Green et al., 2016). The current study utilizes Linden and colleagues (2008) measure of servant leadership. This measure was selected upon recommendation by Eva and colleagues (2019). It has been tested against Hinkins (1995) criteria for scale development and validation. The psycometric properties have been consistency validated and it offers a broad dimensional structure, inclusive of the core global aspects of servant leadership. Linden and colleagues (2008) identified seven sub-dimensions within servant leadership (see table 1). First, emotional healing, refers to the act of showing concern for subordinate’s personal concerns. Second, creating value for the community, refers to a genuine concern for helping and being involved in the wider community. Third, conceptual ```
""
{"document_type": "Books", "task": "document_parsing"}
669ca961115b3a95c7faea7c296cae8f
```markdown From this information, St. Jude’s was able to develop a comprehensive approach to immunizing its workers against influenza, centered on education, availability and what they refer to as “feedback & follow-up.” For St. Jude’s, the immunization education campaign needed to be employee-focused, at least as it related to the general medical staff, in order to overcome some long-held fears and misinformation. Specifically, the hospital used available evidence to show the efficacy of the vaccine and how it could be instrumental in preventing workers from getting sick and using up sick leave. These educational messages were delivered in a variety of ways: at staff meetings, through e-mail, company newsletters, and on informational posters. As the staff became better educated about influenza and the immunization process, St. Jude’s set about to make the vaccine more accessible to staff. Beginning early in the flu season and continuing throughout the fall, they made it available to all healthcare personnel including those who worked outside of normal business hours and outside of its main location. To do so, they often used intermediaries to help deliver flu shots. And they made special accommodations for populations that could be difficult to reach, including physicians. The work didn’t stop there. St. Jude’s utilized a process they call “feedback & follow-up.” On a weekly basis, the infectious control staff reviewed the list of workers who hadn’t been vaccinated. Those names were then referred to supervisors for follow-up reminders, a process that lasted about three months as the number of non-compliant employees was whittled down. Because of the complexity of this three-pronged approach, St. Jude’s needed acceptance at all levels of the hospital, including the top members of the administration, and central authority figures within each department, which they were able to accomplish. In the end, workers who failed to get immunized made an active decision to do so, rather than being allowed to passively avoid being immunized. And that gave the hospital the impetus to persevere until it reached its immunization goals for each year. In 2004, the first year of the immunization program, St. Jude’s goal was an 80% vaccination rate, which it reached in early January. The same goal was set and realized in 2005. And in 2006, St. Jude’s exceeded its goal with a 96% vaccination mark, reaching this peak with little additional effort compared to the challenges experienced in the first two years of the program. In trying to improve upon its worker immunization rates, officials at St. Jude’s began to ask some hard questions about why so few employees were getting immunized each year. They determined that many workers didn’t recognize influenza as a serious problem. And since flu shots had not been mandated at the hospital, it wasn’t seen in the same light as other diseases, such as measles and hepatitis B, for which they did have mandatory vaccination. St. Jude’s also found that while immunizations are important to the hospital as an occupational health issue and an infection control measure, their employees didn’t necessarily see it that way. It then became apparent that employee attitudes about flu shots needed to be considered, and that an appropriate education program would have to be developed. What did St. Jude’s learn from this whole process? First, that an increase in its immunization rate is directly related to the amount of energy put into the program. Second, that acceptance and endorsement from hospital administration is crucial. Third, the culture of acceptance helps improve immunization rates from year to year. Additionally, the hospital has found that use of different delivery methods, such as the flu nasal spray, can help increase rates of immunization. And finally, through education and information, patients can be some of the biggest advocates for healthcare personnel immunization. ```
""
{"document_type": "Books", "task": "document_parsing"}
b2986b807568db3bb6db76f83ca3c835
```markdown We are aware of only one existing scheme, MiniSec [10], that provides for secrecy of broadcast (and indeed of unicast) messages in wireless sensor networks. MiniSec broadcast requires the sender and all recipients of the broadcast to hold a shared key $K$. Further, time is divided into “epochs” and all broadcast participants have clocks that are loosely synchronised to within an epoch. A broadcast message payload $M$ is appended with a nonce (which is a combination of the packet counter and the epoch number), and then encrypted using offset code-book (OCB) mode [16] of block cipher encryption. OCB encryption essentially makes the payload and nonce non-separable in cipher-text, and a receiver can thus verify authenticity of the message by checking that the nonce obtained post-decryption matches the expected counter value. The use of OCB therefore provides both secrecy and authenticity in MiniSec. The loose time-synchronisation in MiniSec poses some concerns about replay attacks within an epoch, and these are addressed via use of Bloom filters to detect and discard such replayed packets. Though MiniSec operates in general multi-hop networks, we believe its fundamental weakness (when applied to broadcast) lies in the assumption that the shared key can be kept safe at all nodes. Even if one node in the network were to be physically compromised by an intruder to obtain the shared key, they could forge messages that would pass the authenticity tests at other nodes. In other words, MiniSec does not satisfy the second desirable property listed in the previous subsection, which requires authenticity of broadcast messages to be guaranteed even if one or more nodes in the network are compromised. We now summarise a few relevant broadcast authentication schemes (that do not provide secrecy). TinySec [13] develops mechanisms for symmetric-key encryption of data at the link-layer of the communication protocol. Though TinySec does not mandate how the encryption key is derived, the expectation is that the key would have a long lifetime and would be shared by all parties involved in the communication. As mentioned earlier, this is problematic for broadcasts, since receivers are untrusted and can potentially use the shared key to forge broadcast messages. The $\mu$TESLA [5] protocol overcomes the above problem by using symmetric-key encryption with time-varying keys. The base-station constructs a key chain by repeatedly applying a hash function to an initial random value, and the root-key (the last hash value obtained) is distributed to each node securely based on a pre-distributed symmetric key. The chain construction allows nodes to verify that disclosed keys are authentic. Loose time-synchronisation of the network into regular time intervals is assumed, and the base-station uses a single key from the key chain for the whole duration of a time interval. The key is disclosed by the base-station at a later time, when nodes can verify that the key is a valid member of the chain, the message authentication codes (MACs) of stored broadcast packets are correct, and that the time delay is such that only the base-station could have constructed the received packets. Some of the drawbacks of this scheme are the need for network-wide (loose) time synchronisation, and the high storage requirement (of potentially malicious or vacuous packets) at each node until the authenticity of the packets can ```
""
{"document_type": "Books", "task": "document_parsing"}
0e38c146c084605642c4e86d5bf11132
```markdown 3. Grosfeldnir, A.; Gerchak, Y. Multiple Lotsizing in Production to Order with Random Yields: Review of Recent Advances. *Ann. Oper. Res.* 2004, 126, 43–69. [CrossRef] 4. Brown, A.O.; Tang, C. The impact of alternative performance measures on single-period inventory policy. *J. Ind. Manag. Optim.* 2006, 2, 297–318. [CrossRef] 5. Feng, T.; Keller, L.; Zheng, X. Decision making in the newsvendor problem: A cross-national laboratory study. *Omega* 2011, 39, 41–50. [CrossRef] 6. Postorino, M.N.; Versaci, M. A neuro-fuzzy approach to simulate the user mode choice behaviour in a travel decision framework. *Int. J. Model. Simul.* 2008, 28, 64–71. [CrossRef] 7. Cacciola, M.; Calcagno, S.; Megali, G.; Morabito, F.; Pellicano, D.; Versaci, M. FEA design and misfit minimization for in-depth flaw characterization in metallic plates with eddy current nondestructive testing. *IEEE Trans. Magn.* 2009, 45, 1506–1509. [CrossRef] 8. Kahneman, D.; Tversky, A. Prospect theory: an analysis of decision under risk. *Econometrica* 1979, 47, 263–291. [CrossRef] 9. Liu, W.; Song, S.; Qiao, Y.; Zhao, H. The loss-averse newsvendor problem with random supply capacity. *J. Ind. Manag. Optim.* 2017, 13, 1417–1429. [CrossRef] 10. Du, S.; Zhu, Y.; Nie, T.; Yu, H. Loss-averse preferences in a two-echelon supply chain with yield risk and demand uncertainty. *Oper. Res.* 2018, 18, 361–388. [CrossRef] 11. Long, X.; Nasiry, J. Prospect theory explains newsvendor behavior: The role of reference points. *Manag. Sci.* 2015, 61, 3009–3012. [CrossRef] 12. Zhao, X.; Geng, W. A note on “Prospect theory and the newsvendor problem”. *J. Oper. Res. Soc. China* 2015, 3, 89–94. [CrossRef] 13. Liu, W.; Song, S.; Wu, C. Impact of loss aversion on the newsvendor game with product substitution. *Int. J. Prod. Econ.* 2013, 141, 352–359. [CrossRef] 14. Ma, L.; Xue, W.; Zhao, Y.; Zeng, Q. Loss-averse newsvendor problem with supply risk. *J. Oper. Res. Soc.* 2016, 67, 214–228. [CrossRef] 15. Schweitzer, M.E.; Cachon, G. Decision bias in the newsvendor problem with a known demand distribution: experimental evidence. *Manag. Sci.* 2000, 46, 404–420. [CrossRef] 16. Wang, C.X.; Webster, S. The loss-averse newsvendor problem. *Omega* 2009, 37, 93–105. [CrossRef] 17. Wang, C. The loss-averse newsvendor game. *Int. J. Prod. Econ.* 2010, 124, 448–452. [CrossRef] 18. Xu, X.; Chan, F.; Chan, C. Optimal option purchase decision of a loss-averse retailer under emergent replenishment. *Int. J. Prod. Res.* 2019, 57, 4594–4620. [CrossRef] 19. Yu, H.; Zhai, J.; Chen, G. Robust optimization for the loss-averse newsvendor problem. *J. Optim. Theory Appl.* 2016, 171, 1008–1032. [CrossRef] 20. Xu, X.; Chan, C.; Langevin, A. Coping with risk management and fill rate in the loss-averse newsvendor model. *Int. J. Prod. Econ.* 2018, 195, 296–310. [CrossRef] 21. Xu, X.; Wang, H.; Dang, C.; Ji, P. The loss-averse newsvendor model with backordering. *Int. J. Prod. Econ.* 2017, 188, 1–10. [CrossRef] 22. Herweg, F. The expectation-based loss-averse newsvendor. *Econ. Lett.* 2013, 120, 429–432. [CrossRef] 23. Wu, M.; Bai, T.; Zhu, S. A loss averse competitive newsvendor problem with anchoring. *Omega* 2018, 81, 99–111. [CrossRef] 24. Wang, R.; Wang, J. Procurement strategies with quantity-oriented reference point and loss aversion. *Omega* 2018, 80, 1–11. [CrossRef] 25. Mandal, P.; Kaul, R.; Jain, T. Stocking and pricing decisions under endogenous demand and reference point effects. *Eur. J. Oper. Res.* 2018, 264, 181–199. [CrossRef] 26. Bai, T.; Wu, M.; Zhu, S. Pricing and ordering by a loss averse newsvendor with reference dependence. *Transp. Res. Part Logist. Transp. Rev.* 2019, 131, 343–365. [CrossRef] 27. Uppari, B.S.; Hasija, S. Modeling Newsvendor Behavior: A Prospect Theory Approach. *Manuf. Serv. Oper.* 2019, 21, 481–500. [CrossRef] 28. Gerchak, Y.; Vickson, R.; Parlar, M. Periodic review production models with variable yield and uncertain demand. *IIE Trans.* 1988, 20, 144–150. [CrossRef] 29. Wang, Y.; Gerchak, Y. Periodic review production models with variable capacity, random yield, and uncertain demand. *Manag. Sci.* 1996, 42, 130–137. [CrossRef] ```
""
{"document_type": "Books", "task": "document_parsing"}
105ab1548f9ce05cdbebbfe716835228
```markdown will include the exact web site address of the College’s Clery Law-compliant publication as well as information that additional copies can be requested from the Department of Public Safety during normal business hours. The security report and additional statistics are available on the Web at http://www.mtholyoke.edu/offices/dps. **Reporting Crimes** The College encourages every member of the community—faculty, staff, students, and visitors—to report all crimes promptly. To report a crime or emergency, members of the community should call the Department of Public Safety. Professionally trained officers are available for response 24 hours a day, seven days a week, 365 days a year. Criminal offenses can also be reported to the dean of the College, Dean of Students, director of residential life, director of student activities, or the director of human resources, who will in turn report the incidents to Public Safety for inclusion in the campus annual crime report. **Confidential Reporting Policy** The College has a policy to accept third-party anonymous reports of sexual assault on a standard form available in the Office of the Dean of the College, the Health Center, and at Public Safety. The form is forwarded to Public Safety for inclusion in the annual security report. Remember that all employees, except where confidentiality is governed by law, should report to Public Safety any criminal incidents brought to their attention. The victim’s name is not required. This allows Public Safety to have accurate records of the number of incidents involving members of the community, to include those statistics in our annual Safe & Sound security report, and to alert the community if there is a potential of danger. Although the College recognizes the importance of confidentiality, federal law requires us to record and act upon certain information affecting the safety of the entire community. The Department of Public Safety operates under federal and Massachusetts general laws and has statutory requirements imposed for confidentiality, privacy, and public disclosure of investigatory material. As a general matter of law, the department must acknowledge that an alleged crime has been reported and release basic information about location and time of occurrence. Disclosure of this information is always done so as to protect the victim’s privacy. **Access to Campus Buildings and Grounds** The College has the right to restrict access to campus grounds, academic and administrative buildings, and residence halls, which are open to faculty, staff, students, and invited guests. Building hours are posted, and unauthorized individuals may be asked to leave. Public Safety has the authority to issue trespass notices to unauthorized people, which is usually done upon receipt of a complaint, and to arrest anyone returning to campus after receiving such a notice. Residence halls are always locked; each student is issued a key to her room and access card (which is also the College student ID) to the outside door. Residence hall student room doors and windows are provided with locking devices. Most academic buildings are secured and closed between 2:00 am and 6:00 am. Public Safety checks that only people with authorization are in buildings after hours. Some academic buildings have nonpublic hours for members of the community. When a building has nonpublic hours, the outside doors are secured and members of the community (who have been authorized) can use their access card to enter the building until closing time. Visitors and others may be asked to leave College buildings during nonpublic hours. During College recesses (low occupancy periods, holidays, etc.), all building hours are subject to change. Both academic and administrative buildings are generally secured at 6:00 pm on weekdays and closed on weekends and holidays during recesses. The card access privileges are limited in residence halls that are closed during recesses. During these periods, Residential Life distributes to ```
""
{"document_type": "Books", "task": "document_parsing"}
a7d191f795be270eee416925f07b72bc
```markdown period before recovery. Costa Rica was, however, awarded pre-judgment interest on the costs and expenses found compensable, in the sum of US$20,150.04. The Court further decided that, in the event of any delay in payment, post-judgment interest would accrue on the principal sum; that interest would be paid at an annual rate of 6 per cent. The total amount of compensation awarded to Costa Rica was therefore US$378,890.59 to be paid by Nicaragua by 2 April 2018. Following this Judgment, Nicaragua, by letter of 22 March 2018, informed the Court that it had transferred to Costa Rica the total amount of compensation awarded. The Court handed down a second judgment on the merits on 2 February 2018, in the joined cases concerning Maritime Delimitation in the Caribbean Sea and the Pacific Ocean (Costa Rica v. Nicaragua) and Land Boundary in the Northern Part of Isla Portillos (Costa Rica v. Nicaragua). I recall that the proceedings in the Maritime Delimitation case were brought by an Application of Costa Rica on 25 February 2014. The proceedings in the Land Boundary case were brought by an Application of Costa Rica on 16 January 2017. The two cases were joined by an Order of the Court handed down on 2 February 2017. The Court observed in its Judgment that the Land Boundary case raised issues of territorial sovereignty which were expedient to examine first, because of their possible implications for the maritime delimitation in the Caribbean Sea. The Court first held that the question of sovereignty over the coast of the northern part of Isla Portillos on the Caribbean Sea had not been decided in its Judgment rendered on 16 December 2015. It then recalled that, according to its interpretation of the 1858 Treaty of Limits between Costa Rica and Nicaragua in its 2015 Judgment, “the territory under Costa Rica’s sovereignty extend[ed] to the right bank of the Lower San Juan River as far as its mouth in the Caribbean Sea”. Noting that the report submitted to it by the Court-appointed experts had dispelled all uncertainty about the geography of the area, the Court found that Costa Rica had sovereignty over the whole of Isla Portillos, with the exception of Harbor Head Lagoon and the sandbar separating it from the Caribbean Sea. These latter features were found to be under Nicaragua’s sovereignty. The Court then held that, by establishing and maintaining a military camp on the beach of Isla Portillos, Nicaragua had violated Costa Rica’s territorial sovereignty as defined in the Judgment, and ruled that the camp had to be removed from Costa Rica’s territory. The Court considered that the declaration of a violation of Costa Rica’s sovereignty and the order addressed to Nicaragua to remove its camp from Costa Rica’s territory constituted appropriate reparation. The Court next turned to the Maritime Delimitation case, beginning with the delimitation in the Caribbean Sea. With respect to the starting-point for the delimitation, the Court considered it preferable, due to the great instability of the coastline in the area, to select a fixed point at sea — two nautical miles from the coast on the median line — and connect it by a mobile line to a point on solid land on Coast Rica’s coast which was closest to the mouth of the San Juan River. The Court delimited the territorial sea, in accordance with Article 15 of the United Nations Convention on the Law of the Sea and with its own jurisprudence, in two stages: first, it drew a provisional median line; secondly, it considered whether any special circumstances existed which justified an adjustment to that line. As to special circumstances, the Court, in particular, stated that the instability of the sandbar separating Harbor Head Lagoon from the Caribbean Sea and its situation as a small enclave within Costa Rica’s territory also called for a special solution. Noting that, should territorial waters be attributed to the enclave, they would be of little use to Nicaragua, ```
""
{"document_type": "Books", "task": "document_parsing"}
fc8838d9c581698b07709a506cc081f0
```markdown the building can also have a quick financial return. For an average 3-story residential building the costs for all materials resulted in a total of $1,025,223.63. When considering LEED features the building only increases by 5% which adds only $52,394 to the ending costs of the gold LEED certified building. Only a 2% difference from the usual 2%-3% cost increase was seen in LEED buildings [14]. LEED features like solar panels and HVAC systems can also pay off those additional costs in just about a couple years after installation making the additions even more desirable. The solar panels for example can take anywhere from 5-9 years to pay off depending on the abundance of sunlight in the area. HVAC systems immediately after installation can contribute to paying off the LEED features. Considering the LEED features in Table 1 it would take about 8 years to begin paying off the features and about 25 total years to have the features completely paid off without any government assistance. For this reason, many owners and investors are looking into developing and innovating green buildings [15]. 6. Educational Objectives The LEED research project introduces the student-scholar model and exposes students to a variety of avenues civil engineering offers such as, project management, structural engineering, and environmental engineering. The project exposes students to valuable skills that are needed in the field of engineering. Being a part of a group that encourages creativity, teamwork, and innovation, it teaches skills that transfer seamlessly to the field. The project encourages diversity within minority groups in engineering such as women, to take leadership roles and be role models for future generations to follow their footsteps in the STEM (Science, Technology, Engineering, and Mathematics) field. Understanding LEED gives young engineers an understanding of ethics and how to apply the ecological concept into the field of construction. The world is heading to a point where engineers must understand how to follow environmentally friendly procedures to combat pollution and climate change. Using the student-scholar model, students are well equipped to tackle the field of engineering and gain skills needed for the real world. Civil engineering as a major is a broad discipline. Upon getting a baccalaureate degree in CE, graduates are able to go into various engineering fields such as, geotechnical, structural, environmental, etc. California State University, Northridge’s civil engineering program introduces the student-scholar model to prepare students for the master’s program offered at their university. However, the LEED research projects give young engineers a broader perspective of what fields the students would be interested in. The project gathers pieces of content that is learned throughout the four-year program to show young engineers the practical application of their curriculum. Diversity within the field of engineering as a whole has progressed at a steady rate when compared to the 20th century. The LEED research projects enhance diversity within young engineers by encouraging leadership and teamwork. The project mimics real life scenarios where engineers must cooperate with a variety of team members no matter the gender or ethnicity. In team environments all members have a saying: it was up to the leader to gather the ideas and incorporate them into the project. Under the LEED research projects, everyone is encouraged to take ownership and be a leader, all culminating into a group of young engineers ready to transition into the field. With the earth’s health rapidly declining, understanding LEED will aid in the fight against climate change. The construction industry plays a crucial role in creating pollution through the use of natural resources, production of waste, and high energy consumption. The LEED research project enhances students’ understanding of pollution that is caused from construction, thus, provoking young engineers to innovate new technologies and modern concepts to combat pollution. With updated ```
""
{"document_type": "Books", "task": "document_parsing"}
ffd671ab2e1b6de93e0d56d9cd8ab3aa
```markdown GEOS 24250. Geophysical Fluid Dynamics: Understanding the Motions of the Atmosphere and Oceans. 100 Units. This course is part of the atmospheres and oceans sequence (GEOS 24220, 24230, 24240, 24250) and is expected to follow Geophysical Fluid Dynamics: Rotation and Stratification (GEOS 24240). The course demonstrates how the fundamental principles of geophysical fluid dynamics are manifested in the large-scale circulation of the atmosphere and oceans and their laboratory analogs. Topics include: balance of forces and the observed structure of the atmospheric and oceanic circulations, statistical description of the spatially and temporally varying circulation, theory of Hadley circulation, waves in the atmosphere and oceans, baroclinic instability, wind-driven ocean circulation. Instructor(s): N. Nakamura Terms Offered: Spring Prerequisite(s): GEOS 24230 and 24240, or consent of the instructor. Knowledge of vector calculus, linear algebra, and ordinary differential equations is assumed. Equivalent Course(s): GEOS 34250 GEOS 24300. Paleoclimatology. 100 Units. This class will cover the theory and reconstruction of the evolution of Earth's climate through geologic time. After reviewing fundamental principles that control Earth's climate, the class will consider aspects of the climate reconstructions that need to be explained theoretically, such as the faint young sun paradox, snowball Earth episodes, Pleistocene glacial / interglacial cycles, and long-term Cenozoic cooling. Then we will switch to a temporal point of view, the history of Earth's climate as driven by plate tectonics and biological evolution, and punctuated by mass extinctions. This will allow us to place the theoretical ideas from the first part of the class into the context of time and biological progressive evolution. Instructor(s): D. Archer Terms Offered: Winter Prerequisite(s): One quarter of chemistry Equivalent Course(s): GEOS 34300 GEOS 24600. Introduction to Atmosphere, Ocean, and Climate Modeling. 100 Units. This hands-on course will discuss how we model atmosphere- ocean- and climate-dynamics using numerical models of varying complexity. We will discuss both the relevant physics as well as numerical techniques, including finite-difference methods for ordinary and partial differential equations, as well as spectral methods. The primary focus of the course will be on relatively simple models, including 1D energy balance models, radiative-convective columns, and quasi-geostrophic models for atmosphere and ocean dynamics, which can be fully understood and applied in the context of a quarter-long course. We will end with an overview of the physics and numerics used in more complex general circulation and coupled climate models. The course will be structured using a combination of lectures, in-class exercises, and discussion of homework exercises. Homework will include programming exercises as well as simulations and analysis using existing model code. Instructor(s): M. Jansen Terms Offered: Autumn Prerequisite(s): Prerequisites: GEOS 24220/34220 “Climate foundations”; knowledge of vector calculus, linear algebra, and partial differential equations; basic knowledge of python (could potentially be replaced by significant programming experience in other languages). Recommended: Geophysical fluid dynamics 24220/34220 and 24240/34240. Equivalent Course(s): GEOS 34600 GEOS 24705. Energy: Science, Technology, and Human Usage. 100 Units. This course covers the technologies by which humans appropriate energy for industrial and societal use, from steam turbines to internal combustion engines to photovoltaics. We also discuss the physics and economics of the resulting human energy system: fuel sources and relationship to energy flows in the Earth system; and modeling and simulation of energy production and use. Our goal is to provide a technical foundation for students interested in careers in the energy industry or in energy policy. Field trips required to major energy converters (e.g., coal-fired and nuclear power plants, oil refinery, biogas digester) and users (e.g., steel, fertilizer production). This course is part of the College Course Cluster program: Climate Change, Culture and Society. Instructor(s): E. Moyer Terms Offered: Spring Prerequisite(s): Knowledge of physics or consent of instructor Equivalent Course(s): ENST 24705, GEOS 34705, ENSC 21100, CEGU 24705 GEOS 24800. Climate Systems Engineering. 100 Units. How might humans use geoscience and engineering to intervene in the climate system with the goal of limiting the impacts of historical carbon emissions? Climate Systems Engineering is the intersection of Climate Systems Science and Systems Engineering. Topics will include (1) solar geoengineering with a focus on stratospheric aerosols, (2) open-system carbon removal such as the addition of alkalinity to soils or directly to the ocean, and (3) local interventions to reduce glacial melting; along with crosscuts on (4) systems engineering and (5) policy implications. Foundational knowledge of climate-related geoscience is a required prerequisite. About a third of class time will be devoted to student presentations and discussion. Class work includes problem sets, peer-graded technical micro-essays, and a collaborative project. Instructor(s): D. Keith Terms Offered: Autumn Prerequisite(s): GEOS 13300 The Atmosphere is required. GEOS 24220 Climate Foundations is strongly recommended. ```
""
{"document_type": "Books", "task": "document_parsing"}
2b8069ee4f705239510c42b564f13f71
```markdown now her response to the ingestion of this single allergen was only mild asthma. An experiment was devised to utilize her reactivity to this cookie as a rough indicator system; she was asked to eat the cookie in Catskill just before she drove north to Albany to work. She subsequently reported that each time after she ate this cookie in the morning in Catskill, developed slight asthma in Catskill, and drove north on the thruway to work, her asthma would disappear at the area of the same mile marker on the New York State Thruway. On the other hand, if she did the reverse and ate the cookie in Albany, she would not get asthma while in Albany. However, at the same above-mentioned area on the New York State Thruway, while driving home, south from work, she would experience mild asthma. An investigation using the methods described earlier revealed that this point (the distinct mile marker) was in the general vicinity of the divide between the higher geomagnetic properties north of this border and the lower geomagnetic properties south of this border. Thus, it appeared that the higher the geomagnetic properties of the area, the more resistant the patient was to known allergens. This finding was consistent with observations vis-à-vis the Roxbury episodes. Once this location on the thruway was discerned, other patients with similar sensitivities were asked to repeat this experiment, ie, drive north and then south along this section of the thruway while being provoked by a known allergen. The findings of improvement north of this location and exacerbation south of this location were duplicated on many occasions. (The patients were not told what to expect from this experiment or where the dividing line was until they had completed the experiment.) Another case involved a husband and wife who lived in Kingston, NY. The husband had atopic dermatitis of his hands, mainly due to a hypersensitivity to cow’s milk. Avoidance of cow’s milk produced an improvement in his hands, and ingestion of cow’s milk or cow’s milk products while in Kingston produced an exacerbation of his dermatitis. His wife had a severe case of asthma due to a variety of ingestants and inhalants; avoidance of all offending substances produced an improvement in her asthma. The couple agreed to make observations regarding the relationship of their symptoms to various geographical locations and to test foods and observe reactions at different geographical locations. They were not informed about previous geomagnetic observations or what to expect. They first went to Roxbury, where they stayed for 1 day. In Roxbury, they both experienced some moderate improvement of their symptoms. They then went to Binghamton, NY, a city about 70 miles southwest of Roxbury, where they experienced even greater improvement; the husband’s hands improved so much that after 4 days in Binghamton he was able to ingest cows milk, and yet his hands continued to improve the longer he stayed there. His wife’s asthma almost cleared in Binghamton, and she was able to tolerate some allergenic foods without experiencing symptoms; other foods, however, produced a mild to moderate exacerbation of her asthma but not the severe reaction previously experienced. When both patients returned to Kingston, all symptoms due to food intolerances quickly returned; there was no residual benefit. The possible effect of environmental inhalant factors at all these locations was investigated and discounted. Of significant interest was that both patients agreed that, although Roxbury was better than Kingston, Binghamton was significantly better than both places; thus a gradient had been observed in regard to resistance to the development of symptoms due to an allergenic insult vis-à-vis geographic location: Binghamton > Roxbury > Kingston. When the geomagnetic map with overlay maps was examined to compare the relative geomagnetic strengths of Binghamton with those of Roxbury and Kingston, it was found that the same gradient levels of geomagnetism existed: Binghamton > Roxbury > Kingston. Another observation regarding Binghamton concerned a patient who was a student at a college there, but who lived in New Paltz, NY. New Paltz is a small town in the Hudson River Valley 20 miles south of Kingston and approximately 100 miles east of Binghamton. The patient was asthmatic and, spontaneously, in the course of conversation about geographic effects, reported that she always felt better in Binghamton. She knew for years that whenever she traveled west to east (from Binghamton to New Paltz), at a specific area in the journey (around the town of Roscoe, NY) her asthma would return. Her asthma would clear at the same place when traveling from east to west on her return trip to Binghamton. The geomagnetism of Binghamton is higher than that of New Paltz. The geomagnetism west of Roscoe is higher than east of Roscoe. Once again, another observation was made that higher geomagnetism is more salubrious to an asthmatic than lower geomagnetism. Sunset effect and the seashore effect Although these observations exhibited a correlation between geomagnetic properties of the Earth and a person’s ability to resist an allergenic assault, there were still some unexplained influencing factors operative other than geomagnetism: ```
""
{"document_type": "Books", "task": "document_parsing"}
00233a0b23e5ab17efbc4eb45bf9eb11
```markdown numbers were to be used (i.e., a rating of 12 indicates 20% more risk or benefit than a rating of 10). Participants were encouraged to double-check the relationship between the values they submitted. I understand the current authors’ desire to have a more efficient procedure, reluctance to use 10 as a starting point, and that an efficient way to implement this may be to use a slider going from 0 to 1000. But note that the new procedure skips the step of first ordering the activities, that may have some effects on how they are evaluated. Also, providing a scale may give the participants the idea that the full scale should be used, and the activities should be distributed along the scale. In the original study the emphasis was on evaluating risks and benefits of the activities relative to each other. The changed response mode in the replication may direct the emphasis more towards evaluating “absolute” values of risks and benefits for the activities. One may argue that the change does not necessarily impact the central research question to be evaluated (i.e., the negative association between risk and benefit). The current authors acknowledge the difference in measures, and claim it to be necessary for faster responses, scalability and reducing cognitive burden. I wonder whether this assumption has been tested through piloting. I would imagine that even with the current response mode, many participants will mentally order and compare between the different activities. The cost in time and cognitive burden may thus be fairly high also in the revised methods (as it has to be done without visual aids). If technically possible, I would recommend trying to implement an ordering stage first, and then a stage of entering numbers to indicate the relative difference between each ranked activity. The instructions could also emphasize the importance that participants compare their responses to risks or benefits, to make sure that they express the intended relative relationships between the activities. Addition of Task 1c Task 1c where participants will rate both perceived risk and perceived benefit appears to be a useful modification of the design, and segmenting this to its own participant group appears to be a way to control for these effects without deviating from the replication of tasks 1a and 1b. The only disadvantage I can think of is the reduction of statistical power of 1a and 1b. However, it was not clear to be whether the order of the two ratings in task 1c were to be counterbalanced between participants as a control for order-effects (as opposed to e.g., always rating benefits first and risks second)? Shortened Task 3 Each participant will rate all risk events on two of the nine scales from the original article. This is done in order to give the study a manageable duration. Such an adjustment may be necessary, but it rests on the assumption that answering the two scales when presented on their own is not significantly different from if they were presented amongst the full set of nine scales. This assumption may presents an alternative explanation for diverging results. I would encourage the researchers to consider alternative designs where a subsample answers the full set of the nine scales, in order to compare the results from those participants to those who answer only two. An alternative (but weaker) solution could be to ensure that each participant that answers only two scales, will always answer one from each of the two factors (“novelty” and “dread”). The two solutions could also be used in combination. Details in Qualtrics survey to consider: The task 1 instructions use the terms “net” and gross”. The replication target article discusses the possibility that these instructions may not have been correctly understood by the participants. I suspect that the terms may be even less familiar for the average modern MTurk worker than it was ```
""
{"document_type": "Books", "task": "document_parsing"}
2cb8beeef17e0a8e8051f2f6e8d55a3c
```markdown Call option holders who wish to exercise their adjusted options to obtain the Rights for subsequent exercise, sale or other purposes bear sole responsibility for determining when to exercise their options as well as complying with all terms and conditions of the Rights offering applicable to Rights exercise or delivery. DELIVERY SETTLEMENT AND PROTECT PROVISIONS Option contracts which are exercised, and physically-settled security Futures contracts which mature, will require the settlement of all component securities included in the contract deliverable at the time of the option contract exercise, including rights, warrants, or similar instruments. Additional entitlements (such as due bills, eligibility to participate in tender offers, elections, etc.) may also automatically attach to securities deliverable upon option exercise. Conversely, exercised calls and or matured Futures contracts may be unable to realize the benefit of securities or entitlements not associated to the contract deliverable at the time of the option exercise or Option contract maturity. Except in unusual cases, securities deliverable as a result of equity option exercises and or Option contract maturity are settled through National Securities Clearing Corporation (NSCC). Rights and obligations of Members with respect to securities settling at NSCC as a result of an option exercise/assignment are governed by the rules of NSCC. NSCC has its own rules which enable purchasers of securities to protect themselves for value which may be lost if timely delivery is not made to them of securities subject to specific deadlines, such as the expiration of a tender offer, rights offering, election, or similar event. These rules are generally called protect or liability notice procedures, and are intended to protect purchasers by binding the delivering parties to liability if such value is lost because timely delivery is not effected. Purchasers of securities must observe the rules and procedures of NSCC to avail themselves of such protect provisions of NSCC. Questions regarding these provisions should be addressed to NSCC. SPECIAL RISKS Call Holders/ Put Writers As a result of the adjustment described above, the Rights will be part of the adjusted BCSF1 options deliverable, but only until the Rights expire, after which time they will be dropped from the deliverable of the option contract. When the Rights expire and are dropped from the deliverable of the option contract, any value the Rights may have had will no longer be associated with the option contract. As a result, holders of in-the-money calls may be disadvantaged unless they exercise in sufficient time to obtain the Rights. After the Rights expire and are dropped from the deliverable of the option contract, holders of short put positions who are assigned will be required to purchase BCSF stock whose value may have been substantially diminished by the Rights distribution. Uncovered Short Obligations Holders of assigned calls or exercised puts, and holders of short positions in physically-settled security Futures at maturity who do not possess the underlying security at the time of assignment or exercise are subject to special risk. Suspension of trading of the underlying security, inability to borrow the security, or similar events may preclude the possibility of effecting timely delivery, thereby exposing persons with an obligation to deliver to liability if timely delivery is not effected (See Delivery Settlement and Protect Provisions above). DISCLAIMER This Information Memo provides an unofficial summary of the terms of corporate events affecting listed options or futures prepared for the convenience of market participants. OCC accepts no responsibility for the accuracy or completeness of the summary, particularly for information which may be relevant to ```
""
{"document_type": "Books", "task": "document_parsing"}
9f628e1dda5874c4265d491f2bba9a80
```markdown (ETIM); The ETIM has continually been accused of influence in the Xinjiang Uighur Autonomous Region (XUAR) these claims extend over responsibility for several domestic attacks leading to the heightening in security nationwide. ETIM was also accused of being linked to an attack on the Chinese Embassy in The Kyrgyz Republic. In July, the XUAR became the only provincial-level government to pass specific implementing measures of a new counterterrorism law. At present China continues to put forth concerns that Chinese citizens have recently traveled to Iraq and Syria to associate with known terror groups such as ISIS. The Chinese government has continuously listed terrorism as amongst the "three evils." Along with terrorism separatism and religious extremism, the Chinese government made it clear that they intend to engage these issues so they may no longer pose a threat to domestic stability. China's counterterrorism efforts focus primarily on the East Turkistan Islamic Movement (ETIM), an organization that advocates independence for the Uighurs, China's largest Muslim ethnic minority. In the past years, there has been an escalation of the Chinese security and surveillance in the Xinjiang Uighur Autonomous Region (XUAR). China's first comprehensive counterterrorism law came into effect on January 1, 2016. This law explicitly endorses China's longstanding counterterrorism efforts. This has proven to be a political hot topic in which some mostly western observers have openly claimed difficulty in the distinguishing of suppression of terrorist groups and or ethnic minorities, most often ethnic Uighurs who the Chinese Communist Party has previously deemed politically subversive(UNHCR2016). In regards to countering the terror threat, China has implemented a multitude of regional and global moves which include the proposal of working together with many groups. Some of the groups include ASEAN trade group of which China is a member as well as the Shanghai Cooperation Group. The collaboration of China with this group will deal greatly with terror attacks that may affect the China border and the region as a whole. The ASEAN trade group is a large entity with a lot of member countries. In case of an attack in China or the greater region, the group could come together and combine efforts to deal with the problem. The main goal for the formation of ASEAN was to make a podium for Asian integration and cooperation that work with Asian nations to bring unity, development, and sustainability among the member countries as well as solve disputes and other problems that may arise in the region (Hänggi 2014). The ASEAN group is quickly becoming one of the world’s most influential and successful entities and is proving to be a great powerhouse that is not limited only to economic and infrastructure transformation in Asia. Good relationships within such the organization would positively impact countries in the region in the fight against terror. China has proposed various regional organizations such as the Silk Road Initiative. China is spending a lot of money on this project that involves developing the infrastructure of the countries along the old Silk Road (Wei 2016). This initiative aims to improve the relationship of China and other foreign nations greatly. The objective of these many organizations is inevitable to bring together nations in the region in times of difficulty such as when facing the threat of terrorism. It has become unanimously clear that terrorism cannot be dealt with by a single state rather. It is an initiative that involves the cooperation of many countries. With the ```
""
{"document_type": "Books", "task": "document_parsing"}
ccec19dbee2d4ae9ad93a75cbf9441b9
```markdown but it switches its moving direction to start going backwards. The algorithm keeps going backwards until it overshoots the peak and notices that taking a step backward leads to a lower point on the curve. This implies a movement on a negative slope, so the algorithm reverses its direction again. When the algorithm settles, the output oscillates around the peak of the curve. This dithering must be minimized in order to not degrade the extinction ratio of the switch, which is maximum at the peak. We mentioned earlier in section 3.1.1 that a resistive TIA experiences varying PD bias. This phenomenon can prove advantageous if the MPD gain increases with increased reverse-bias voltage across it, i.e. it gives more output current for the same amount of optical power incident upon it. For this case, let us imagine that the control algorithm is approaching the switch’s bar state, i.e. the peak of the MZI’s sinusoidal optical power at the bar output along a positive slope (either from the left of the peak while moving to the right or from the right of the peak point while moving left). The control algorithm now sees that the output signal of the PD is increasing upon moving closer and closer to the bar state, as well as moving in the correct direction results in larger increments in the PD’s output signal because the PD is now capable of providing more output current for the same increment in optical power. Now let us imagine that the control algorithm is moving along a negative slope of the MZI’s output curve (being on the right of the peak while moving rightward or being to the left of the peak while moving leftward). If the control algorithm keeps moving along this negative slope, then a decrease in the optical power incident upon the PD, due to a motion away from the bar state of the switch, causes the output current of the PD to decrease. This decreased PD current results in smaller reverse bias voltage seen by the PD, which decreases the gain of the PD, and in turn, decreases the output current of ```
""
{"document_type": "Books", "task": "document_parsing"}
6297a3b316762e8de824e56ffddf15a3
```markdown cognitive status and have an important role in preventing or relieving suffering (De Witt Jansen et al., 2017a). As follows, when aiming to improve the palliative care for people with dementia, there is much to gain in optimizing the palliative care provided by nursing staff (Bolt et al., 2019). Nevertheless, nursing staff experience several barriers in providing palliative care for people with dementia. A study states that the main barrier in providing palliative care for people with dementia is a lack of continuity according to healthcare professionals working in nursing homes, which entails time pressure, an increasing demand to be efficient, a lack of resources and the end-of-life transition (Midtbust, Alnes, Gjengedal & Lykkeslet, 2018). Another study shows that according to nursing staff there are multiple challenges in providing palliative care specific to people with dementia, including: making the transition to palliative care at an appropriate point in the care pathway; limited competence, skills and capability in working with people with dementia; and collaboration between teams from a variety of settings, organizations and disciplinary backgrounds (Ryan, Gardiner, Bellamy, Gott & Ingleton, 2012). These challenges and barriers for nursing staff in providing palliative care specifically for people with dementia could indicate that nursing staff needs support in providing this care. In a study of De Veer, Francke & Poortvliet 73% of the nurses expressed the need for extra training in one or more subjects related to providing palliative care (De Veer, Francke & Poortvliet, 2003). Bolt et al. (2019) state that nursing staff needs in providing palliative care are: communication, interdisciplinary collaboration, recognizing and addressing palliative care needs, education and organizational support, training and handling challenging behaviour (Bolt et al., 2019). Another study shows that potential facilitators of nurses in providing palliative care would be external support, monthly meetings, access to a resource file and peer support (Hasson, Kernohan, Waldron, Whittaker & McLaughlin, 2008). From these studies can be concluded that nursing staff need different forms of support to overcome the challenges and barriers to improve the quality of palliative care for people with dementia. Getting an understanding of these nursing staff needs to overcome these challenges and barriers in providing palliative care specifically for people with dementia, would facilitate the improvement of the care they provide and the tailoring of the palliative care specific for people with dementia. Although some studies already mention facilitators and forms of support that might help, there are no studies that describe specifically which support form is needed most. Moreover, these studies make no distinction between the different levels of nursing staff and the different work settings. There is there little know about the needs of nursing staff in the home care setting, while 53% of the people with ```
""
{"document_type": "Books", "task": "document_parsing"}
e57001b80ca31affe0fbe435e986c3c8
```markdown With the growth of national communities migratory assimilation slows down. "New Europeans" do not want to learn the language, get to know the culture of Europe, neglect civil institutions, preferring to brew in their own environment, forming closed neighborhoods that are subject to their traditional leaders and who are burdened with the laws of the state alien to them, unless they (laws) do not relate to generous social assistance and free housing. Often, they not only preserve their religion, but choose the most extreme forms of it (in particular, shariah demonstrations in the UK can be mentioned, while 40% of Muslims in Britain are in favor of officially introducing Shariah law in "mostly Muslim areas"). This behavior of migrants can not but cause rejection of Europeans. The latest parliamentary elections in the countries of the Old World have shown that many Europeans are not afraid to seem tolerant. They mass vote for representatives of the right parties who promise to return countries to the traditional European way of life or fight radical Islam. The problem of the relationship with the emigrant communities becomes the main issue of the political agenda in Western European countries. The causes of the crisis of multiculturalism (from which the problem of immigration) lies much deeper - in the crisis of culture of Europe itself. The ideology of multiculturalism is formed by the "left" post-war movement, as a reaction to Nazism and fascism and represents another extreme. It was anticipated that a new European culture would completely abandon conservatism, nationalism and Christian religiosity - and would be a convenient medium for resolving old conflicts and adapting arriving migrants from the countries of the East to the "free world." But the opposite trend happened: the radically weakened "autochthonous" culture of Europe has not attracted migrants (except for social welfare and dreams of "beautiful life"). Moving massively to the Old World, they retain their identity and separate themselves from "faceless Europeans." In fact, in Europe, there is no conflict between Christianity and Islam, because European civilization has historically been weakened by the secularism of the New Age, which in turn replaced the Middle Ages with virtually all the latest history of European civilization. Russian religious philosopher S.M. Bulgakov so appreciated these historical stages: "The Middle Ages and the new time are so opposite and, at the same time, are so similar to each other as the concavity and bulge of one and the same relief, which is considered from different sides. The Middle Ages asserted only the divine origin in life seeking, in the name of this divine principle, to crush the human principle and its freedom. On the contrary, the new time, in its one-sided reaction against the Middle Ages, tends to be completely forgotten about the divine beginning; totally absorbed by the development of pure humanity, it stands on the border of godlessness, practically uncontrollably passing into pagan polytheism, naturalism and idolatry. The Middle Ages recognized the earthly sky and only tolerated, as with inevitable evil, with the earth; the new time knows mainly the earth, and only for the private, personal use, as if on holidays in the temple, the heaven remembers "[1,169-170]. These lines, written ```
""
{"document_type": "Books", "task": "document_parsing"}
2d44a575b5638e4ec716551e9bbba9c2
```markdown CS 755. Security and Privacy in Wireless Networks. 3 credits, 3 contact hours. This course covers selected topics on security and privacy in wireless networks and is intended for graduate students who are interested in network security. This course can help the students learn the state of the art and open challenges in wireless network security and privacy, thus enhancing their potential to perform research or pursue a career in this emerging area. CS 756. Mobile Computing and Sensor Networks. 3 credits, 3 contact hours. This course provides an in-depth study of mobile computing and sensor networks, which are becoming major components of the transition from today's world of desktop computers to a world where computing is ubiquitous. The main topics include: techniques to handle mobility in the Internet and ad hoc networks; operating systems, programming languages, and protocols for sensor networks; applications, middleware, programming models, and security ubiquitous computing environments. CS 759. Advanced Image Processing and Analysis. 3 credits, 3 contact hours. Prerequisite: CS 659. Advanced study of recent research in image processing, analysis, and understanding. Topics include all image processing techniques, high-level recognition approaches, and automated expert vision systems. CS 775. Seminar in Software Engineering. 3 credits, 3 contact hours. Prerequisite: CS 673. A seminar in which students pursue intensive study of specialized topics in the current literature of software engineering. Each topic is supported by an initial reading list on current problems in theory and practice. The results of the studies are discussed in class with students, faculty and invited specialists. CS 777. Seminar in Software Management and Production. 3 credits, 3 contact hours. Prerequisites: Ph.D. core courses. A seminar in which students pursue intensive study of specialized topics in the current literature of software management and production. Each topic is supported by an initial reading list covering current problems in theory and practice. The results of the studies are discussed in class with students, faculty, and invited specialists participating. Topics include, but are not limited to, theory of algorithm structure, analysis of algorithms and programs, hardware technology assessment, automated tools for software production, software measurements and quality, peripheral device interfaces, data communications, computer networks, distributed processing, software verification, implementation standards, documentation standards, system security, software copyright, and project control and organization. CS 782. Pattern Recognition and Applications. 3 credits, 3 contact hours. Prerequisite: CS 610. Study of recent advances in development of (statistical and syntactic) pattern algorithm, approximation, and estimation techniques. Topics include statistical estimation theory, classifier design, parameter estimation and unsupervised learning, bias vs. variance, nonparametric techniques, linear discriminant functions, tree classifiers, feature extraction, and clustering. Additional topics include Support Vector machines (SVM), Bayesian Learning, Hidden Markov Models (HMM), evolutionary computation, neural networks, with applications to signal interpretation, time-series prediction, and Biometrics. CS 785. Seminar in Computer and Information Science I. 3 credits, 3 contact hours. Prerequisite: determined by nature of topic area. Advance notice of the topics to be covered is given. These seminars examine in depth a special interest area of computer and information science. It emphasizes recent work in area selected for the offering of the course. This course is for master's students and cannot apply toward master's degree credit. CS 786. Special Topics. 3 credits, 3 contact hours. Prerequisite: as determined by nature of topic area. A continuation of CS 785. CS 790. Doct Dissertation & Res. 0 credits, 0 contact hours. CS 790A. Doct Dissertation & Res. 1 credit, 1 contact hour. Co-requisite: CS 791. Approval of the dissertation advisor is required for registration. Experimental and/or theoretical investigation of a relevant topic in computer science. For PhD students who have successfully defended their dissertation proposal. The student must register in CS 790A every semester until successful dissertation defense. A written dissertation must be defended and approved by a committee of at least five members. Students enrolled in the PhD program before 2015 Fall must accumulate a minimum number of credits in Doctoral Dissertation Research and Pre-Doctoral Research (see graduate catalog for program-specific details; the same requirement may apply to joint PhD programs with other universities). CS 790B. Doct Dissertation & Res. 3 credits, 3 contact hours. Co-requisite: CS 791. Since the CS 790A course should normally be taken instead, approvals of academic and dissertation advisors are required for registration. Experimental and/or theoretical investigation of a relevant topic in computer science. For PhD students who have successfully defended their dissertation proposal. Students enrolled in the PhD program before 2015 Fall must accumulate a minimum number of credits in Doctoral Dissertation Research and Pre-Doctoral Research (see graduate catalog for program-specific details; the same requirement may apply to joint programs with other universities). CS 790C. Doct Dissertation & Res. 6 credits, 6 contact hours. Co-requisite: CS 791. Since the CS 790A course should normally be taken instead, approvals of academic and dissertation advisors are required for registration. For PhD students who have successfully defended their dissertation proposal. Experimental and/or theoretical investigation of a relevant topic in computer science. Students enrolled in the PhD program before 2015 Fall must accumulate a minimum number of credits in Doctoral Dissertation Research and Pre-Doctoral Research (see graduate catalog for program-specific details; the same requirement may apply to some joint programs with other universities). ```
""
{"document_type": "Books", "task": "document_parsing"}
1ab9333c42497b29ea8f4dd69b0dadc6
```markdown from the faculty and other areas on campus. They are going to look at what they can do about improving General Education courses. One of the carrots that they have to bring about improving is bringing new faculty, bringing new blood into some of those particular courses. They are also going to think about when to teach those courses, how to teach those courses, and how to get more feedback from the campus in terms of what is happening with General Education. The office is going to have a Task Force on General Education that is going to be chaired by Deputy Provost John Cunningham. There have been a few obstacles with regards to the Amherst 250 Plan, and some of those obstacles are internal, some of them are external. Many of them have been overcome. The important point is the administration will be bringing a hundred and fifty new faculty to the campus, and this is extraordinary. This will help the campus get involved in some of the new energy projects that Vice Provost Kostecki was talking about as well as take leadership in other types of teaching and research initiatives. Senator O’Connor stated that other faculty are saying that right now, October 4, 2007, it is too late to advertise for people in certain disciplines, expecting to hire them for September 1, 2008. With that in mind, the University is still going forward. Senator O’Connor wondered what would happen if a department does not even show up on the NRC. What is that going to do if they have already been allocated a position? Associate Provost Harvey stated that it is true that they will not know until after the holidays what the NRC results are; those positions are going to be carried over to another hiring cycle. In terms of the other ones, there is a lot in the pipeline already from the previous year. There are a few departments, a few disciplines that have early meetings, where it is important to be talking to folks. Many more occur in October, November, December, some even in January. Some Deans have put out ads or notices of anticipation with a contingent on funding statement. So, the Provost’s Office is trying to do everything they can to meet the cycles, but unfortunately they cannot allocate them until they know what the budget says. They cannot make the decisions until people have had a chance to look at the data. Senator O’Connor asked whether the protection for everyone here is contingent on funding. Associate Provost Harvey answered, yes. That is always true. Senator Roland Chilton stated he was curious to what extent Associate Provost Harvey involved the faculty, other than by sending them short-term requests for proposals. Associate Provost Harvey stated that, in terms of working with the faculty, the Senate – two or three years ago – established an Amherst 250 Task Force to help walk through this process. This is a presentation that they made there awhile ago, and they have been trying to work as closely as they can with the governance process. In terms of how faculty in the department could get access to some of these resources, certainly on the performance side that is based entirely on the work that goes on in the departments. The benchmarking data that was collected last year was an entirely faculty-driven process. The NRC data are collected by someone else but reflect the effort of faculty here, and the campus decided what faculty were in what areas and so forth. On the instructional side, that really is purely an effort to try to send some help into places that have the worst problems, but the Provost’s Office has not yet encountered a department that did not want to get those lines. So, there is not much being done in terms of making these decisions that is not completely a reflection on what is going on in the departments and recognition of faculty effort. Senator Christine King asked if this means the Schools and Colleges should soon be hearing about possible allocations for this year. She stated that Associate Provost Harvey made a very salient point – that meetings are occurring next week. Mid-October through early December is national meeting time for most professional organizations, and so the School and Colleges are anxious about when they might hear. ```
""
{"document_type": "Books", "task": "document_parsing"}
1372ec59e2a3c506704dcc064813066e
```markdown how to plan and implement evaluations. This is certainly very important. However, if what we want to do is effectively sustain high-quality evaluation practice in organizations and learn from the findings, it is critically important to also consider: (1) What capacities beyond individual knowledge and skill to do evaluation are needed to support a program’s ability to plan, conduct, learn from, and sustain evaluation and (2) Who needs to be the “target audience” for ECB activities in order to facilitate this support. Not everybody needs to be an evaluator to support high-quality evaluation practice and learning, but for those who aren’t going to be doing evaluation what do they need to know and why do they need to know it? Participants will be introduced to the fundamentals of ECB; intended long-, mid-, and short-term outcomes of ECB interventions; a range of ECB interventions; and important considerations in measuring evaluation capacity in organizations. This course provides practitioners with an opportunity to consider what types of evaluation capacity they want to build within their organization and why. Participants will engage throughout the course in building a logic model of a potential ECB intervention for their organization with specific emphasis on what needs to change among whom in the organization. Learning Objectives: After this workshop, participants will be able to: - Define evaluation capacity building - Articulate several intended outcomes of evaluation capacity building - Identify at least two audiences who are important to engage as audiences for future ECB efforts to support high-quality evaluation practice and learning in their organization and explain why this is the case - Describe several approaches to building evaluation capacity - Explain several nuances involved in measuring evaluation capacity within organizations Evaluation Management Instructor: Tessie Catsambas, MPP Description: The purpose of this course is to provide new and experienced evaluation professionals and funders with strategies, tools, and skills to: (1) develop realistic evaluation plans; (2) negotiate needed adjustments when issues arise; (3) organize and manage evaluation teams; (4) monitor evaluation activities and budgets; (5) protect evaluation independence and rigor while responding to client needs; and (6) ensure the quality of evaluation products and briefings. Evaluation managers have a complex job. They oversee the evaluation process and are responsible for safeguarding methodological integrity, evaluation activities, and budgets. In many cases they must also manage people, including clients, various stakeholders, and other evaluation team members. Evaluation managers shoulder the responsibility for the success of the evaluation, frequently dealing with unexpected challenges and making decisions that influence the quality and usefulness of the evaluation. Against a backdrop of demanding technical requirements and a dynamic political environment, the goal of evaluation management is to develop, with available resources and time, valid and useful measurement information and findings and ensure the quality of the process, products, and services included in the contract. Management decisions influence methodological decisions and vice versa, as method choice has cost implications. The course methodology will be experiential and didactic, drawing on participants’ experience and engaging them with diverse material. It will include paper and online tools for managing teams, work products, and clients; an in-class simulation game with expert judges; case examples; reading; and a master checklist of processes and sample forms to organize and manage an evaluation effectively. At the end of this training, participants will be prepared to follow a systematic process with support tools for commissioning and managing evaluations and will feel more confident to lead evaluation teams and negotiate with clients and evaluators for better evaluations. Foundations in Data Visualization Instructor: Ann K. Emery, MS Description: Today’s evaluators need to use a variety of strategies to present their data. Data visualization can help to make complex data easier to understand and to use. The one-day training will walk participants through a step-by-step design process that they can apply to their own projects. Participants will learn how to customize ```
""
{"document_type": "Books", "task": "document_parsing"}
c2afd3cb6eeff62914b07d212c2335f6
```markdown speaking in line with the economic theory that informed labor market deregulation during the last decades, it is important to highlight a few final remarks and draw attention to current caveats and limitations. First, our data only allowed us to look at the quality of the match in terms of education, thereby neglecting the other dimensions of skill mismatch. While it is possible that the quality the match also improved along these other dimensions as a result of the EPL reform, future research should provide more direct evidence that this was indeed the case. On the one hand, we suspect that our finding that mismatch was not much reduced in the manufacturing sector, contrary to what happened in the service sector, while productivity increased in both sectors, provides an indirect indication that the skill reallocation was not confined to formal education, but interested at least partially various skills learned on the job, e.g., industry-specific or at least skills portable within the traditional industrial districts that characterize the Italian economy. On the other hand, the productivity effect of the EPL reform is estimated to be rather modest, suggesting that we should not expect large gains from overall reallocation. This is consistent with the views, expressed by some social scientists, that the Italian labor market was already more flexible, and mobility higher, than traditionally believed (e.g., Contini and Trivellato, 2005). Second, our data do not allow us to say much about the way the reform affected skill formation. The curbed EPL may reduce the expected duration of the employment relationships. This may have adverse effects on the incentives of workers and firms to invest in specific skills, and be ultimately detrimental to productivity and competitiveness developments, particularly for CMEs, as neatly pointed out by Harcourt and Wood (2007). It is well possible that our productivity estimates are mostly capturing the immediate, one-off positive impact deriving from worker reallocation, but fail to incorporate the more long-run effects deriving from skill formation. If so, future research might detect that a dismantling of EPL provisions is followed by an even smaller, and possibly negative, effect on a country’s competitiveness. Third, we focused on a reform that reduced EPL for workers on open-ended contracts. In principle, the new environment may push firms to substitute temporary with permanent workers (e.g., Schivardi and Torrini, 2008). If so, productivity may arise, at least according to the few empirical papers that find that the share of temporary workers in the firm is associated with a smaller productivity (Dolado and Stucchi, 2008). However, this effect might be countervailed by the fact that permanent workers are, by virtue of the reform, now “less permanent”, which may once again instill the negative productivity effects arising from lower accumulation of firm-specific skills. This is yet another issue that might benefit from continuing research using richer data, e.g. matched employer-employee data combining worker flows with firm financial information. Forth, one may question the effectiveness of EPL reforms when this is not accompanied by complementary reforms of the labor market and of the social security system. With the Jobs Act of 2014, Italy has taken further steps towards the reduction of EPL that, in the spirit of “Flexicurity”, were accompanied by significant improvements in the effectiveness and inclusiveness of its unemployment insurance (Picot and Tassinari, 2017). Progress on vocational training and active labor market policies, ```
""
{"document_type": "Books", "task": "document_parsing"}
165b27b99f2bef5a76296e909da7e7b4
```markdown and the CM agree that the CM shall, at the University’s option and upon the University’s demand, pay to or credit the University Liquidated Damages in an amount equal to the CM’s total Preconstruction Stage Compensation. 5.7.15.1 For each GMP Proposal the CM fails to submit as and when required, the University shall be entitled to recover the cumulative sum of the associated Liquidated Damages. 5.7.15.2 The Liquidated Damages described in this Section 5.7.15 are only intended to compensate the University for the damages the University itself incurs as a direct result of the CM’s failure to submit a GMP Proposal as and when required. 5.7.15.3 The Liquidated Damages described in these Supplementary Conditions are not intended to compensate the University for any damages the University incurs on account of (1) any claims attributable to the CM that are brought by others including Separate Consultants and Separate Contractors as a result of the CM’s failure to submit a GMP Proposal as and when required or (2) any failure of the CM to timely, properly, and completely perform the Contract other than the failure to submit a GMP Proposal as and when required. 5.7.15.4 The parties acknowledge that the above-specified Liquidated Damages are not penalties but are a reasonable estimate of the damages the University itself would incur as a direct result of the CM’s failure to submit a GMP Proposal as and when required. The parties each irrevocably waive the right (if any) to challenge the validity and enforceability of those Liquidated Damages. Notwithstanding any other provision of the Contract Documents to the contrary, if a court determines that the Liquidated Damages or their application are void and unenforceable, the University shall be entitled to recover the actual damages that it incurs on account of the CM’s failure to submit a GMP Proposal as and when required. 5.7.15.5 In addition to other rights that the University may have relative to Liquidated Damages, the University may deduct Liquidated Damages from the CM’s Preconstruction Stage Compensation as the damages accrue. If payments then or thereafter due the CM are not sufficient to cover such amounts, the CM shall immediately pay the amount of the insufficiency to the University. Insert Section 6.3.3.3 as follows: 6.3.3.3 Cutting and patching shall be done by craftspersons skilled in the type(s) of work involved. Refer to the specifications for detailed cutting and patching procedures. Insert Section 6.3.4.1 as follows: 6.3.4.1 The University will not permit any Work to proceed until utility marking of University-owned utilities has been completed. The CM shall follow all dig permit and OUPS requirements including pre-marking the approximate excavation area in white at least 72 hours prior to the planned excavation. Insert Section 6.3.7 as follows: 6.3.7 In accordance with Federal Safety Standards (CFR 49 Parts 191 and 192) as enforced by PUCO, beginning January 31, 2013, University’s Utilities Department and its designee, Ohio State Energy Partners, will require all personnel working directly with natural gas lines, including those doing “new construction” work, to provide written and performance verification of DOT Operator Qualifications for each covered task performed on the Columbus Campus. This directive is intended for natural gas distribution systems and is not applicable to natural gas piping in buildings on the downstream side of the buildings’ gas regulator. The CM shall provide the DOT Operator Qualifications Certification directly to the Project Manager. Replace existing Section 6.5.12 with the following: 6.5.12 The CM shall attach the above information to the minutes of the weekly progress meetings. Replace existing Sections 6.6.1 through 6.6.3.1 with the following: 6.6.1 The CM shall schedule a weekly progress meeting for the A/E and other Persons involved in the Project. The purpose of the progress meeting is to review progress on the Project during the previous week, discuss anticipated progress during the following weeks, review critical operations, and discuss critical problems. 6.6.2 The CM and A/E shall be represented at every progress meeting by a Person authorized with signature authority to make decisions regarding possible modification of the Contract Documents or Construction Progress Schedule. 6.6.2.1 The CM shall notify the A/E and other Persons involved in the Project of the time and place of the progress meeting that shall thereafter be the same day and hour of the week for the duration of the Project, unless the CM notifies the A/E and other Persons involved in the Project of a different day and hour at least two days in advance. 6.6.2.2 The CM shall have any of its Subcontractors attend the progress meeting as determined advisable by the CM, or as requested by the A/E. ```
""
{"document_type": "Books", "task": "document_parsing"}
1ca7d860c6bc3d16331376104f1b2227
```markdown HBV-DNA levels at LT and might profit from high-dose long-term administration of HBIG combined with NA as earlier studies showed [10,19,20]. However, in the absence of clear data showing which patients could be suspended from HBIG, long-term HBIG therapy remains the standard of care in many centers [2]. In search of an alternative approach that would reduce costs but maintain maximum efficacy to protect from HBV recurrence, we used substituted commercial HBIG formulations fresh frozen plasma (FFP) with high anti-HBs titers (hyperimmune plasma = HIP). HIP can be easily produced in any blood transfusion center and our experience provides data on long-term efficacy, kinetics, safety and economics of HIP for the prevention of HBV reinfection after LT. **Methods** **Patients, hyperimmune plasma administration and follow-up** In this study we report our long-term experience with 21 patients with HBV-related end-stage liver disease (ESLD) who received HIP for prevention of HBV reinfection after LT. Patients underwent liver transplantation at the Geneva University Hospital between 1989 and 2007 for HBV-related cirrhosis (n = 16), fulminant HBV (n = 3) and cirrhosis from HBV-HDV infection (n = 2) and were subsequently followed at two hepatology outpatient clinics (Geneva and Lugano) (Table 1). All patients except two were serum HBV-DNA negative at the time of transplantation. The two with detectable HBV DNA prior LT were transplanted 1989 and 1993 respectively (the HBV status of all patients is summarized in Table 1). Before 1996, patients received only HIP as recurrence prophylaxis because NA were unavailable at this time. Since 1996, combination therapy with HIP and NA (Lamivudine, 100 mg daily or Adefovir, 10 mg daily) was standard treatment for all patients. Two patients died during follow-up from non HBV-related causes. All patients except the three patients with fulminant HBV infection had chronic hepatitis B infection with HBsAg and anti-HBc for at least 6 months before evaluation for liver transplantation. With the exception of the first two patients (H1, H2), all patients with positive HBV DNA at LT evaluation were started on NA and treated while being on the waiting list in order to achieve undetectable HBV DNA at the moment of transplantation. The three patients with fulminant HBV infection were not previously known for chronic HBV infection and not vaccinated against HBV, but had a clear exposure to HBV and their serological status at time of diagnosis indicated a recent infection. All three cases however had undetectable HBV DNA at LT. The serological status of all patients before LT is summarized in Table 1. All patients received intra-operatively, during the anhepatic phase, at least two HIP units (range 2-10 units), each containing at least 4,500 IU anti-HBs antibodies. Postoperatively, patients received one HIP unit per day for 7 days, and then once weekly for 3 weeks post-LT. Anti-HBs serum antibody levels were measured every 4 to 8 weeks thereafter and patients received HIP on demand to maintain anti-HBs levels above 200 IU/L. HIP was administered intravenously over a period of 1 to 3 hours in a volume of 300 ml (± 20 ml) without any pre-medication. During the transfusion all patients were closely observed, and blood pressure, pulse and body temperatures were measured twice an hour. If any allergic reaction appeared, HIP transfusions were stopped and substituted with 5,000 IU commercial HBIG. Efficacy was determined by testing the anti-HBs titer every 4-8 weeks and HBsAg and HBV DNA twice per year. Occasionally no HIP was available at the blood bank, in which case patients received 5,000 IU commercial HBIG. The study was approved by the local Ethics Committees (in Geneva and Lugano) and the Swiss Agency for Therapeutic Products (Swissmedic protocol 2006DR2070). **Hyperimmune plasma production, quarantine and stability** Fresh frozen plasma (FFP) derived from donors with high anti-HBs titers (>15,000 IU/L) was obtained either from whole blood donations or with plasmapheresis. Initially methylene blue for virus inactivation was added to the FFP but was discontinued in 1998 in favor of product quarantine (see below). All donors met the national criteria for blood donation (Swiss Red Cross Blood Donation Service, SRCBDS). Plasmapheresis was performed with a Haemonetics PCS2 device. From each apheresis procedure, two units of 300 ml (± 20 ml) filtered, leukocyte-deprived plasma (leuco-depletion 95%, <1 × 10^6 leukocytes, according to the manufacturer) were collected. Each HIP unit contained therefore at least 4,500 IU anti-HBs antibodies. All donated plasma products were screened for serological markers according to the SRCBDS guidelines including determination of anti-HCV (test introduced 1990), HCV RNA (1999), HBsAg (1974), HBV DNA (2007), anti-HIV (1985), HIV RNA (2002), Treponema pallidum (1974) and ALT levels (1989). The plasma was shock-frozen with a process that allows complete freezing within one hour to a core temperature below -30°C. After freezing, each plasma unit was stored at -80°C for at least four months but not more than 24 months for quarantine when donors were tested again for the presence of serological markers. After the second negative serological testing the HIP product was released from the blood bank for intravenous transfusion. Some donors had persistently very high serum anti-HBs levels (>25,000 IU/L) but in others, levels dropped below the desired concentration and those received a ```
""
{"document_type": "Books", "task": "document_parsing"}
9d0ffd030e033e070392b5a103e5e78a
```markdown (o) **Disclosure to, or examination by, Federal Housing Finance Agency or Federal home loan banks** This chapter shall not apply to the examination by or disclosure to the Federal Housing Finance Agency or any of the Federal home loan banks of financial records or information in the exercise of the Federal Housing Finance Agency’s authority to extend credit (either directly or through a Federal home loan bank) to financial institutions or others. (p) **Access to information necessary for administration of certain veteran benefits laws** (1) Nothing in this chapter shall apply to the disclosure by the financial institution of the name and address of any customer to the Department of Veterans Affairs where the disclosure of such information is necessary to, and such information is used solely for the purposes of, the proper administration of benefits programs under laws administered by the Secretary. (2) Notwithstanding any other provision of law, any request authorized by paragraph (1) (and the information contained therein) may be used by the financial institution or its agents solely for the purpose of providing the customer’s name and address to the Department of Veterans Affairs and shall be barred from redisclosure by the financial institution or its agents. (q) **Disclosure pursuant to Federal contractor-issued travel charge card** Nothing in this chapter shall apply to the disclosure of any financial record or information to a Government authority in conjunction with a Federal contractor-issued travel charge card issued for official Government travel. (r) **Disclosure to the Bureau of Consumer Financial Protection** Nothing in this chapter shall apply to the examination by or disclosure to the Bureau of Consumer Financial Protection of financial records or information in the exercise of its authority with respect to a financial institution. (Pub. L. 95–630, title XI, § 1113, Nov. 10, 1978, 92 Stat. 3706; Pub. L. 98–21, title I, § 121(c)(3)(C), Apr. 20, 1983, 97 Stat. 83; Pub. L. 99–514, § 2, Oct. 22, 1986, 100 Stat. 2095; Pub. L. 99–570, title I, § 1353(b), Oct. 27, 1986, 100 Stat. 3207–22; Pub. L. 100–690, title VI, § 6186(c), Nov. 18, 1988, 102 Stat. 4358; Pub. L. 101–73, title IX, § 942, Aug. 9, 1989, 103 Stat. 497; Pub. L. 101–647, title I, § 104, Nov. 29, 1990, 104 Stat. 4791; Pub. L. 102–242, title IV, § 411(2)–(4), Dec. 19, 1991, 105 Stat. 2375; Pub. L. 102–568, title VI, § 603(a), Oct. 29, 1992, 106 Stat. 4342; Pub. L. 105–264, § 2(c)(1), Oct. 19, 1998, 112 Stat. 2351; Pub. L. 108–271, § 8(b), July 7, 2004, 118 Stat. 814; Pub. L. 110–234, title XIV, § 14205, May 22, 2008, 122 Stat. 1459; Pub. L. 110–246, § 4(a), title XIV, § 14205, June 18, 2008, 122 Stat. 1664, 2221; Pub. L. 110–289, div. A, title II, § 1216(a), July 30, 2008, 122 Stat. 2792; Pub. L. 111–203, title X, § 1099(3), July 21, 2010, 124 Stat. 2105.) ### References in Text The Federal Rules of Civil Procedure, referred to in subsec. (e), are set out in the Appendix to Title 28, Judiciary and Judicial Procedure. The Federal Rules of Criminal Procedure, referred to in subsec. (e), are set out in the Appendix to Title 18, Crimes and Criminal Procedure. The International Emergency Economic Powers Act, referred to in subsec. (g), is title II of Pub. L. 95–223, Dec. 28, 1977, 91 Stat. 1626, which is classified generally to chapter 35 (§ 1701 et seq.) of Title 50, War and National Defense. For complete classification of this Act to the Code, see Short Title note set out under section 1701 of Title 50 and Tables. The effective date of this chapter, referred to in subsec. (h)(3), is the date upon the expiration of 120 days after Nov. 10, 1978. See section 2101 of Pub. L. 95–630, set out as an Effective Date note under section 375b of this title. The Social Security Act, referred to in subsec. (k)(1), is act Aug. 14, 1935, ch. 531, 49 Stat. 620. Title II of such Act is classified generally to subchapter II (§ 401 et seq.) of chapter 7 of Title 42, The Public Health and Welfare. For complete classification of this Act to the Code, see section 1305 of Title 42 and Tables. ```
""
{"document_type": "Books", "task": "document_parsing"}
05b4ee3ed50a3c2bd9d0cd27b01d2620
```markdown 作为中国周边重要邻国,印度对华消极甚至对抗心态的孳生及膨胀,虽然无法产生类似美国对华恶意行为那样的危害效果,但一则作为中国西南战略方向上的主要行为体,印度对华政策能够给中国造成一定的战略压力;二则作为较早跳出来配合美国的中国周边邻国,印度对华消极心态和恶意行为能够产生明显的示范效应,如果中方处理不当,将有可能导致周边地区及更广大范围出现对华漫天要价的连锁反应,使中国周边和国际环境更加困难。因此,在中美关系恶化、中国外部环境复杂化的情况下,如何管控并经略好中印关系,不仅涉及到中国在印度洋方向的战略稳定与安全,也影响到中国外交和对外战略的全局态势。就此而言,将中印关系确定为中国经略印度洋的核心命题和策略效果的标杆,并不为过。 从中国全球战略角度审视中印关系,需要看到中国整体实力相对印度明显占优,但印度的国际与地区环境较中国有利,双方各有优势。印度不是中国的主要战略对手,中国也不是印度崛起道路上的关键助力,两国关系存在较大的可塑性。对当前国际格局的演变趋势,中印两国有着不同的理解和差异性的诉求,中印合作缺乏稳定且可持续的战略共识。针对未来中长期印度以攻势心态为主的对华战略思维以及印度地缘优势在南亚长期存在的现实,中国应该注意防止对印外交陷入被动求稳的思维误区,避免对印外交目标和外交手段之间出现不协调,注重外交策略的虚实结合,以更加务实的态度和策略妥善处理对印工作。 当前,中国外部环境压力主要来自美西方伙同亚太地区部分势力在海上方向遏制围堵中国的企图。2020年以来,美国拉印度参加反华制华联盟的意图愈发明显。在中国集中精力应对美国压力挑战的时候,防止包括印度洋方向在内的其他战略方向陷入不必要或者不紧迫的地缘矛盾,既符合中方国家利益,也是中方稳妥推进周边战略和“一带一路”建设所必须。但是,在印度洋方向求稳的过程中,要特别注意避免对印工作出现事与愿违的局面,影响中国的周边战略效果。 首先,要避免陷入中印存在共同利益因而存在广泛合作基础的误区。印度和中国虽然同为快速发展的新兴经济体和“金砖”机制成员,但这绝不意味着中印两国在国际和地区事务层面存在广泛的共同利益以及因共同利益而奠定的合作基础。实际上,印度和中国的崛起方式存在本质区别,这种区别决定了中印两国在国际秩序演变方式和方向上存在着难以调和的分歧。印度试图在美国主导的国际格局和规则框架下实现“体制内”的崛起,而中国已经是美国体制所要隔离、排斥乃至打击的挑战者。在印度超越中国之前,印度是不会把与中 ```
""
{"document_type": "Academic Papers", "task": "document_parsing"}
e9cb938c456a802c3c4d0fb72583a778
```markdown BOOKS RECEIVED Auld, W. H. & H. L. Stein. The Guidance Worker: Basis for a Profession. Toronto: W. J. Gage Ltd., 1965. 338 pp. $5.50. Card, B. Y., W. B. Dockrell, W. D. Knill, & J. O. Regan. School Achievement in Rural Alberta. Introduction by John Verney. A Report on Project 614 (1964-65) of the Alberta Advisory Committee on Educational Research. Edmonton: University of Alberta, 1966. 107 pp. Creeth, Edmund, ed. Tudor Plays — An Anthology of Early English Drama. Garden City, N.Y.: Doubleday & Co., Inc., 1966. xiv, 569 pp. France, N. & S. Wiseman. The France-Wiseman Educational Guidance Programme — 1A, 2A & 3A. London & Glasgow: Collins, 1965. 32 pp. each. France, N. & S. Wiseman. The France-Wiseman Educational Guidance Programme — Teacher’s Book. London & Glasgow: Collins, 1965. 34 pp. France, Norman. Mathematics 7-11. Book 1. London & Glasgow: Collins, 1966. 112 pp. France, Norman. Mathematics 7-11. Teacher’s Book. London & Glasgow: Collins, 1966. 112 pp. Garvin, Paul L. Natural Language and the Computer. New York: McGraw-Hill Book Company, Inc., 1963. 398 pp. Macdonald, John. A Philosophy of Education. Toronto: W. J. Gage Ltd., 1965. 279 pp. $4.50. McLuhan, Marshall. Understanding Media. New York: McGraw-Hill Book Company, Inc., 1965 (paperbound ed.). 364 pp. Martin, Catherine Rita. French Grammar. Garden City, N.Y.: Doubleday & Co., Inc. (Doubleday College Course Guides), 1966. 249 pp. $1.75. Mather, D. R., N. France, & G. T. Sare. The Certificate of Secondary Education: A Hand-Book for Moderators. London & Glasgow: Collins, 1965. 188 pp. 15s. May, Ernest R., ed. Anxiety and Affluence: 1945-1965. Vol. VIII — A Documentary History of American Life (David Donald, General Editor). New York: McGraw-Hill Book Company, Inc., 1966. 404 pp. $6.20 cloth; $3.70 soft. Nash, Paul. Authority and Freedom in Education. New York: John Wiley & Sons, Inc., 1966. 342 pp. $6.95 cloth; $3.95 paper. Porter, John. The Vertical Mosaic. Toronto: University of Toronto Press, 1965. 626 pp. $15. Valdman, Albert, ed. Trends in Language Teaching. New York: McGraw-Hill Book Company, Inc., 1966. 298 pp. Ziel, H. R., ed. Education and Productive Society. Toronto: W. J. Gage Ltd., 1965, 217 pp. $5.50 ```
""
{"document_type": "Books", "task": "document_parsing"}
9e6943199071ff7122f8ec5aabd4c9eb
```markdown The common teaching method observed during the field work was lecture and use of blackboard. Few schools especially private schools adopted other measures. An important factor was the existence of a mathematics laboratory. There were significant differences in the means of the combined scores for the groups exposed to different teaching methods. A mixed effect was demonstrated in the case of specific teacher training. The group which had to rely on traditional methods only showed a lower level of achievement. Analysis of data yielded no significant differences between the two groups in class IX. However in case of class VII the result indicated significant variations in the means of the two groups. The issue of the relationships between students’ mathematics achievement and the attitudes of both the student and the teacher toward mathematics was examined in Chapter 6. Both student and teacher attitudes towards mathematics were found to be factors of student learning. There were seen significant differences in the means of the mathematics achievement scores of the students for different attitude levels both in case of students and teachers. There is a high positive correlation between attitudes of students and their scores in mathematics and a moderate positive correlation between attitudes of teachers and the scores of their students in mathematics. This suggests that more positive attitude creates the opportunity for learning and motivation that leads to success in mathematics performance. Chapter 7 explored the influences that gender played on the mathematics achievement of the student. There was no significant difference in the means scores of boys and girls. It was seen that the gender of the student did not affect the combined score of the students for the sample under investigation. Though previous research has revealed the existence of gender disparities in mathematics education, it is also a fact ```
""
{"document_type": "Books", "task": "document_parsing"}
1250efc57fd36793cd00764138d110dd
```markdown Abstract: We study the related problems of denoising images corrupted by impulsive noise and blind inpainting (i.e., inpainting when the deteriorated region is unknown). Our basic approach is to model the set of patches of pixels in an image as a union of low-dimensional subspaces, corrupted by sparse but perhaps large magnitude noise. For this purpose, we develop a robust and iterative method for single subspace modeling and extend it to an iterative algorithm for modeling multiple subspaces. We prove convergence for both algorithms and carefully compare our methods with other recent ideas for such robust modeling. We demonstrate state of the art performance of our method for both imaging problems. Presenter: Han Lun Yap (Georgia Tech) Title: The Restricted Isometry Property for Echo State Networks with Applications to Sequence Memory Capacity. Abstract: The ability of networked systems (including artificial or biological neuronal networks) to perform complex data processing tasks relies in part on their ability to encode signals from the recent past in the current network state. Here we use Compressed Sensing tools to study the ability of a particular network architecture (Echo State Networks) to stably store long input sequences. In particular, we show that such networks satisfy the Restricted Isometry Property when the input sequences are compressible in certain bases and when the number of nodes scale linearly with the sparsity of the input sequence and logarithmically with its dimension. Thus, the memory capacity of these networks depends on the input sequence statistics, and can (sometimes greatly) exceed the number of nodes in the network. Furthermore, input sequences can be robustly recovered from the instantaneous network state using a tractable optimization program (also implementable in a network architecture). Presenter: Teng Zhang (University of Minnesota) Title: Robust subspace recovery by optimization on a geodesically convex function. Abstract: We introduce an M-estimator to robustly recover the underlying linear model from a data set contaminated by outliers. We prove that the objective function of this estimator is geodesically convex on the manifold of all positive definite matrices, and propose a fast algorithm that obtains its unique minimum. Besides, we prove that when inliers (i.e., points that are not outliers) are sampled from a subspace and the percentage of outliers is bounded by some number, then under some very weak assumptions this algorithm can recover the underlying subspace exactly. We also show that our algorithm compares favorably with other convex algorithms of robust PCA empirically. Presenter: Rachel Ward (University of Texas at Austin) Title: Reliable image recovery from undersampled measurements. Abstract: Compressed sensing provides theoretical guarantees for image reconstruction from undersampled linear measurements. These guarantees depend on the underlying image sparsity (e.g., in the discrete gradient), which is not necessarily known a priori. We discuss how certain statistical procedures like cross validation can be naturally incorporated into compressed sensing to verify the reconstruction error directly and estimate underlying model parameters. This procedure is justified by the "near equivalence" of two central concepts in compressed sensing: restricted isometries and ```
""
{"document_type": "Books", "task": "document_parsing"}
cd6856616a4213892bb6d2141c86bc71
```markdown Right to Opt-Out. YOU MAY OPT-OUT OF THE FOREGOING ARBITRATION AND CLASS ACTION/JURY TRIAL WAIVER PROVISION OF THESE TERMS BY NOTIFYING NVIDIA IN WRITING WITHIN 30 DAYS OF COMMENCEMENT OF USE OF NVIDIA RIVA. SUCH WRITTEN NOTIFICATION SHALL BE SENT TO ATTN: LEGAL, 2788 SAN TOMAS EXPRESSWAY, SANTA CLARA, CALIFORNIA, 95051 AND SHALL INCLUDE (1) YOUR NAME, (2) YOUR ADDRESS, (3) THE REFERENCE TO NVIDIA RIVA AS THE SERVICE THE NOTICE RELATES TO, AND (4) A CLEAR STATEMENT INDICATING THAT YOU DO NOT WISH TO RESOLVE DISPUTES THROUGH ARBITRATION AND DEMONSTRATING COMPLIANCE WITH THE 30-DAY TIME LIMIT TO OPT-OUT. 9 Miscellaneous 9.1 You agree that you will not assign these terms or your rights and obligations by any means or operation of law without NVIDIA’s permission. These terms do not create any third-party beneficiary rights. 9.2 If it turns out that any provision of these terms is not unenforceable, such provision will be construed as limited to the extent necessary to be consistent with and fully enforceable under the law and the remaining provisions will remain in full force and effect. Unless otherwise specified, remedies are cumulative. 9.3 If NVIDIA needs to contact you about NVIDIA Riva, you consent to receive the notices by email or through NVIDIA Riva and agree that electronic notice will satisfy any legal communication requirements. Please direct your legal notices or other correspondence to NVIDIA Corporation, 2788 San Tomas Expressway, Santa Clara, California 95051, United States of America, Attention: Legal Department. 9.4 You acknowledge that any software, technology or technical data provided by NVIDIA under these terms are subject to U.S. export controls and the service is subject to U.S. economic sanctions regulations. By using NVIDIA Riva, you confirm that you do not normally reside in any country currently embargoed by the U.S. and that you are not otherwise prohibited from receiving any software, technology or technical data. 9.5 These terms are the entire agreement between you and NVIDIA concerning NVIDIA Riva. If you do not comply with these terms, and NVIDIA doesn’t take action right away, this doesn’t mean that NVIDIA is giving up any rights that NVIDIA may have (such as taking action in the future). 9.6 NVIDIA may make changes to these terms from time to time. NVIDIA will publish the new terms at NVIDIA Riva website. The updated terms will be effective when published. Please review NVIDIA Riva terms of use on a regular basis. You understand and agree that your express acceptance of the updated terms of use or your use of NVIDIA Riva after the date of publication shall constitute your agreement to the updated NVIDIA Riva terms of use. If you do not agree with the updated terms, you must terminate your use of NVIDIA Riva. (v. March 16, 2022) ```
""
{"document_type": "Books", "task": "document_parsing"}
d1791cac6bf1f9289ace090c9ba453dd
```markdown the first end 94 of the valve spool 90 is also caused to rotate. Stated differently, FIG. 4 illustrates actuation of the motor 14 to cause the valve spool 90 to displace in a direction to close the supply port 58 and to open the return port 62. Indeed, rotation of the strut 34 effectively induces a linear displacement of the valve spool 90 within the axial bore 54 formed in the valve body 50, which linear displacement closes the supply port 58, while opening the return port 62. Decreasing the input signal in the motor 14 to decrease the counter-clockwise motor torque results in a corresponding decrease in the control pressure supplied by the pilot valve 10 through the control pressure port 66. This is depicted by the gauge in fluid communication with the control pressure port 66, which reads within a low pressure range. As the motor torque is decreased, the rotor 22 pivots clockwise about pivot point 30, which causes the rocker 26 and the strut 34 to also rotate clockwise. This causes the valve spool 90 to displace within the axial bore 54 of the valve body 50, as described, thus decreasing the opening of the supply port 58 and increasing the opening of the return port 62. The control pressure decreases more and more as the supply port 58 is closed and the return port 62 is opened, until the control pressure reaches a minimum or zero pressure, wherein the supply port 58 is fully closed and the return port 62 is fully opened. As the control pressure decreases, the feedback pressure in the feedback passage 80 also decreases so as to impose less of a negative feedback force on the second end 98 of the valve spool 90. Again, any difference or error between the motor force and the feedback force acting on the valve spool 90 will tend to move the valve spool 90 until the two forces are balanced or equal. The more the motor torque is decreased, the less active is the feedback pressure acting on the valve spool 90. In addition, as is the case for all positions of the valve spool 90, the control pressure is proportional to the motor torque. With reference to FIG. 5, illustrated is a detailed view of a portion of the valve spool 90 and its relationship to the supply pressure port 58 upon displacement. As can be seen, the valve spool 90 comprises with a transition segment 14 configured to vary the rate of change of the area or opening of the supply port 58 per unit displacement of the valve spool 90 within the axial bore 54 of the valve body 50 in a direction to do so. The transition segment 114, shown as having a linear tapered configuration and comprising a circular cross-section, extends between the land 104 and the neck 106 of the valve spool 90. In a position to close ```
""
{"document_type": "Books", "task": "document_parsing"}
32868c68306829e4892b2a50a5b22ae3
```markdown 5. Current experience in robotic microvascular surgery Robot-assisted microvascular surgery was first introduced in cardiac surgery. Endoscopic instruments lacked the necessary degrees of angulation required and were insufficiently long to achieve a precise microvascular anastomosis in the chest [13]. In order for these problems to be solved, robotic surgery was introduced. In June 1998 Loulmet and colleagues performed the first clinical, totally endoscopic, computer-enhanced arrested heart coronary artery bypass in Paris [13]. A study performed on porcine hearts showed that a vascular anastomosis is easier performed by three-dimensional visualisation combined with robotic assistance than manually [13]. In 2000, the performance of arrested heart coronary artery bypass surgery was repeated with the Zeus system by Reichenspurner and his team in Munich [13]. The first report of coronary revascularization on a beating heart was in 2001 [2]. Using both the Zeus and the da Vinci System, over 2000 coronary bypass procedures were performed by the first half of 2002 [1]. From 2002 to 2004 robotic assisted TECAB surgery was performed on 98 patients divided over 12 centres [14]. This study demonstrated that it is safe and efficient to perform this operation in patients by robotic means. Except for the use of robotics in cardiac surgery, robots are still rarely used in microvascular surgery. Especially the area of reconstructive microsurgery demands optimal visualization, technical skill, precise surgical manipulations and minimization of tremor. All these demands are well sufficed by robotic surgery. Experienced microsurgeons operate at an accuracy of 50 μm; robotic assistance refines this accuracy by a factor of 10, to 5 μm [4]. Although high free-flap success rates are achieved by microsurgeons, the loss of a free flap is a dramatic event for the patient. Mostly, a compromised free flap is the result of a technical error. The frequency of these technical errors may be reduced by the use of robotic surgery. Several studies on this subject are already performed. Already in 2000 the Robot Assisted MicroSurgery (RAMS) was used to perform vascular anastomoses of the rat femoral artery, both in vitro and in vivo. The RAMS system proved to be applicable in microsurgery, with the advantages of greater precision and more rapid manipulation compared to the surgeon [15]. Remarkable was that macro movements take more time accomplished by the robot than by the surgeon, while micro maneuvers are performed equally fast or even more rapid by the RAMS system than by the surgeon. Thus, when a surgical procedure approaches the micro level, the time difference between the surgeon and the robotic system is equilibrated. In 2001 Le Roux and colleagues also used the RAMS system (NASA’s Jet Propulsion Laboratory, Pasadena, CA and MicroDexterity Systems Inc., Memphis, TN) to anastomose carotid arteries in rats [16]. All vessels were patent and the error rate was similar to that of conventional techniques. However, using the RAMS system was associated with a significant increase in operating time, particularly due to an increase in time required for needle positioning and knot tying [16]. This increase in operative time may reflect a learning curve. The RAMS system improved the performance of medical students and engineers doing the same task and that of plastic residents carrying out a variety of microsurgical procedures [16]. Karamanoukian et al. used the Computer Motion Zeus Robotic Surgical System to anastomose 1-mm arterial vessels harvested from explanted pig hearts. They concluded that the Zeus robotic technology had certain advantages over the conventional human assistant, with the major advantage being the ability of scaling down the surgeon’s movements to a microscopic level [17]. Another experiment of their group showed an important conclusion. ```
""
{"document_type": "Books", "task": "document_parsing"}
6c412b69e405af019205221cacee59ae
```markdown and pleasing customers is the most important task for EMGS at the moment. Suing a potential customer does not appear to be a good idea. Trademarks are another form of legal protection similar to patents. When a patent has expired, the trademark can protect the innovation’s image and function as a barrier to imitation. In the literal sense, a trademark is “a word, phrase, symbol, and/or design that identifies and distinguishes the source of the goods of one party from those of others.” (The United States Patent and Trademark Office, 2013). “Word” or “phrase” does not appear as prominent in EMGS’s case, and they have for instance no well-known slogan. Symbol-wise, they do have a characteristic logo, but it is not well known outside of certain environments in the oil and gas industry. For example, Statoil has a logo familiar for most Norwegians, regardless of profession. However, by design or content, EMGS’s application of the marine CSEM technology stands out. They are known to be the best supplier in the industry, offering the highest quality surveys, and they have almost 100% market share. They were also the first supplier on the market. EMGS have become a trademark within the marine CSEM industry. They have the reputation of being the first and best supplier, and this can intimidate potential entrants and imitators. Theory also lists trade secrets, information that is valuable to the firm and not known to the public, as a form of legal mechanism of protection. For EMGS, much of the technology is documented in technical papers. There are no explicit “hidden ingredients” like in Coca-Cola. However, in order to fully make use of it in practice, experience is needed. Full understanding and ability to take innovation from a theoretical to a practical level requires experience. This way, one can state that the employees possess tacit knowledge valuable to the firm and not known to the public, and this tacit knowledge can represent a form of “trade secret”. ### 5.3.2 Natural The nature of core knowledge affects how easy an innovation is to imitate. Codified knowledge can easily be transmitted and presents a higher espionage risk. EMGS and clients of EMGS have published technical papers and industry articles since 2002, so the technology is described in books and papers. The CSEM technology is not a new invention in itself; it was EMGS’s application of the technology that was new. This indicates that there is a lot of pre-existent knowledge about the general CSEM technology, which also comprises EMGS’s ```
""
{"document_type": "Books", "task": "document_parsing"}
c3010ea32e7eec4f85d5217e463bfc32
```markdown and pleasing customers is the most important task for EMGS at the moment. Suing a potential customer does not appear to be a good idea. Trademarks are another form of legal protection similar to patents. When a patent has expired, the trademark can protect the innovation’s image and function as a barrier to imitation. In the literal sense, a trademark is “a word, phrase, symbol, and/or design that identifies and distinguishes the source of the goods of one party from those of others.” (The United States Patent and Trademark Office, 2013). “Word” or “phrase” does not appear as prominent in EMGS’s case, and they have for instance no well-known slogan. Symbol-wise, they do have a characteristic logo, but it is not well known outside of certain environments in the oil and gas industry. For example, Statoil has a logo familiar for most Norwegians, regardless of profession. However, by design or content, EMGS’s application of the marine CSEM technology stands out. They are known to be the best supplier in the industry, offering the highest quality surveys, and they have almost 100% market share. They were also the first supplier on the market. EMGS have become a trademark within the marine CSEM industry. They have the reputation of being the first and best supplier, and this can intimidate potential entrants and imitators. Theory also lists trade secrets, information that is valuable to the firm and not known to the public, as a form of legal mechanism of protection. For EMGS, much of the technology is documented in technical papers. There are no explicit “hidden ingredients” like in Coca-Cola. However, in order to fully make use of it in practice, experience is needed. Full understanding and ability to take innovation from a theoretical to a practical level requires experience. This way, one can state that the employees possess tacit knowledge valuable to the firm and not known to the public, and this tacit knowledge can represent a form of “trade secret”. ### 5.3.2 Natural The nature of core knowledge affects how easy an innovation is to imitate. Codified knowledge can easily be transmitted and presents a higher espionage risk. EMGS and clients of EMGS have published technical papers and industry articles since 2002, so the technology is described in books and papers. The CSEM technology is not a new invention in itself; it was EMGS’s application of the technology that was new. This indicates that there is a lot of pre-existent knowledge about the general CSEM technology, which also comprises EMGS’s ```
""
{"document_type": "Web Pages", "task": "table_parsing"}
bed89a5beb28b77df411a79e44cc028e
```markdown (Carpin et al. 2006b, 2007a; Balakirsky et al. 2007; Sato et al. 2008). The Virtual Robot Rescue League is based on USARSim (Carpin et al. 2007b), a high fidelity multi-robot simulator that includes models of numerous robots and sensors, the majority of which are used in the Rescue Robot League (additional applicative scenarios are the ICRA Space Robotics Challenge (Birk et al. 2009) and the IEEE/NIST Virtual Manufacturing Automation Competition). Relieving participants from the requirement of owning expensive robots, which creates a lower entry barrier, teams participating in the Virtual Robots Rescue competition routinely deploy groups of robots much larger than those in the Rescue Robot League. Moreover, thanks to the effortless possibility of adding virtual sensors or actuators to the simulated robots, various mapping algorithms have been either developed from scratch, reused as is, or enhanced and incorporated into more complex control systems. As a consequence, while organizing and running this competition, we faced the challenge of ranking maps produced by various multi-robot teams using a tremendous variety of heterogeneous approaches. After the first exploratory stage, where maps were essentially inspected visually, the necessity to quickly adopt an accountable and repeatable method to grade maps according to some criteria became apparent. Effectively, visual inspection is too subjective of a method to be applied in a competitive environment where winners have to be selected. Unfortunately, at that time and still nowadays, no solution was available and we therefore developed a methodology from scratch. Interestingly, some of the ideas generated in the Virtual Robots Rescue competition were later extended to the Rescue Robot League; a testament to the value of the high fidelity simulation infrastructure sustaining the simulation competition. In this paper, we illustrate the principles governing the scoring methods we developed through the years, and we display some of the results collected during the last competition held in 2008. In no way do we claim the adopted methodology is the best possible at the moment. However, the very nature of the competition has put us in the privileged and challenging position of comparing and ranking maps produced by different research groups embracing a variety of heterogeneous software and algorithmic tools. Another peculiar aspect of our endeavor resides in the simulated nature of the task. Thanks to it, we have the possibility of easily accessing ground truth data, a difficult asset to accurately obtain in real world experiments. The necessity to collect and evaluate input from different competitors has also pushed us to embrace an approach valuing open tools and easy to adopt standards, rather than picking an arbitrary one serving our specific research needs. We believe the contest offered us the opportunity to perform an analytic comparison exercise that, to the best of our knowledge, has never been matched in terms of size and variety. The goal of this paper is to detail our lessons learned and outline some interesting research questions for the future. The paper is organized as follows. In Sect. 2 we present literature related to the task of analytic map comparison, a topic that deserved little attention to date, but that is gaining momentum. Section 3 presents the method we used in order to rank maps and accounts for the practical choices we embraced. Detailed results coming from the RoboCup 2008 event are offered in Sect. 4, where maps produced by the various teams are contrasted and evaluated. In Sect. 5 we compare our metric with some of the methods cited in Sect. 2, outlining similarities and differences. One of our main goals while developing the Virtual Robots Rescue competition and USARSim has always been to keep the simulation framework coupled with real robotic systems as much as possible. For this reason, in Sect. 6, we illustrate how the proposed evaluation procedure ranks maps produced by a real robot and contrast the real results with their simulated counterpart. Finally, in Sect. 7, we outline the lessons learned and identify some open questions worth additional investigation. 2 Related work Robot benchmarking and performance evaluation is a recent research thread and the amount of available scholar work in this area is in general limited. Localization and mapping is no exception to this trend and we describe the few attempts made in establishing both benchmark problems and evaluation metrics. In a recent paper, the RawSeed project is presented (Fontana et al. 2008). RawSeed is an initiative aimed at addressing the very problems dealt with in this special issue, namely to establish independent representation and benchmarks for SLAM algorithms. The project is still in its infancy, but the paper outlines some principles that we subscribe to and that we resume in the next section, namely the importance to tie the evaluation method to the robotics task under examination. In Abdallah et al. (2007) propose a benchmarking infrastructure for the special case of visual SLAM in outdoor environments. The authors also stress the importance of tailoring the benchmarking process to the specific robotic task considered, realizing the inherent difficulty in comparing, for example, indoor and outdoor visual SLAM algorithms. The paper, however, does not provide an assessment metric. A similar effort targeting vision-based robotic localization is presented in Frontoni et al. (2008), where the authors distinguish between topological and metric localization and mainly rely on omnidirectional cameras. In contrast to the previous contribution, they propose an evaluation formula taking into account the size of the dataset used for localization, the resolution of the sensor and the incurred errors. ```
""
{"document_type": "Books", "task": "document_parsing"}
d1a5e62f1dc30249cb7f66bc173577dc
```markdown crowds. Walter contends that from April 1641, Parliament faced popular pressure to act in response to the Earl of Strafford, economic woes, and the growing fear of invasion from foreign Catholic nations. Walter establishes that after Parliament was presented with a petition signed by thousands of men advocating the need for the Earl of Strafford to face justice, tensions had deepened after Parliament’s meeting with the king on 1 May. This resulted in several thousand people demonstrating outside St Stephen’s Palace on 3 May to put pressure on Parliament to act, resulting in the Protestation being passed that day (pp. 51-3). Walter makes clear throughout *Covenanting Citizens* that certain elements of the parliamentary leadership had links with Puritan ministers and the London crowds who they could depend on to support the Protestation. He points out that Puritan ministers Cornelius Burgess and Edmund Calamy acted as intermediaries between the London crowds and parliamentary leaders, with Burgess enjoying the patronage of Earl of Bedford and a connection to John Pym (pp. 55–6). Furthermore, Walter establishes that these groups generally belonged to pro-Scottish factions, and that the Scottish National Covenant can tenuously be argued to be a model for the Protestation, as there were connections between the Scottish delegates who arrived in London autumn 1640 and the City radicals and ministers (pp. 36–7). By looking at the popular context surrounding the Protestation, Walter is able to convey that popular pressure helped shape the Protestation, especially as ‘performing the Protestation was [expected] to be an active, not passive, undertaking’ (p. 200). Walter points out that the age of most subscribers ranged between 18 and 60 which was the age that men became eligible for military service, which Walter suggests that Parliament intended to use the Protestation to mobilise an army when Protestantism and liberties were under threat (pp. 200–3). Walter also scrutinises the instances where individuals refused to swear the Protestation for a number of reasons, including reservations over taking the oath, wanting more time to deliberate over what they were expected to promise (pp. 170–2). Walter points out that some ministers and university students at Oxford formulated their own Protestation oath, while he draws attention to Catholics who refused to swear the oath for religious reasons due to the clause requiring swearers to protect the ‘true reformed religion’ of Protestantism. He remarks that while some Catholics outwardly refused to swear the Protestation, other Catholics vowed to protect the king’s person and the liberties of the nation, only refusing obedience on the part concerning religion. This naturally caused concern from some Protestants that Catholics within their communities were using mental reservation to swear the Protestation, with fears growing due to fears of Catholic plots, especially after the Irish Rebellion. (pp. 183–8). This is an important point for Walter to highlight, as Edward Vallance and David Martin Jones have also argued in their works that Catholics were often permitted to omit clauses of the Protestation oath which pertained to their religion, although it would have been interesting to see whether any Catholics took the oath because they have felt compelled to do so after the Irish Rebellion. Notably, Walter draws attention to the fact that women also featured in some of the Protestation returns, as the surviving draft of the Speaker’s letter for January 1642 crossed out the word ‘men’ in the text and does not appear in the final letter. Walter notes that women who took the Protestation came from all walks of life, including unmarried women, servants, daughters, and married women. This detail on women subscribing to oaths in the early modern period should hopefully open up to further research in the future, especially for scholars looking at gender (pp. 203–5). *Covenanting Citizens* is a thoroughly researched and densely detailed study on the popular impact of oath subscription during the 17th century. Walter strongly argues throughout the book that the Protestation oath was a pivotal turning point in understanding how an oath could be mobilised across the country to obtain political and religious allegiance. Walter has demonstrated how parish registers and the Protestation Returns can shed light on the popular demand of the oath before 1641, and, crucially, that crowds and sermons from the pulpit and in print encouraged people to subscribe to the oath in defence of English liberties and reformed Protestant religion. It would have been interesting to see further analysis in the conclusion on what the long-term impact of the Protestation was during and after the Civil War, although Walter’s study was understandably focused on a short time-frame for the years 1641 and 1642 only. I would recommend this book for anyone interested in the history of early modern British politics, print, and religion, especially for those wanting to study the impact of how print was used as a tool to promote the oath. ```
""
{"document_type": "Books", "task": "document_parsing"}
0ef64e33dbe730e8cb9d9aa806db34ab
```markdown accessing bnetd.org because Jung did not have the list of valid CD codes from Blizzard. [134] Only Blizzard could authenticate legally purchased CDs. [135] Using intention at the ‘reasonable relation’ would protect a circumventer in a case like Sony, where the defendant's efforts to make an interoperable product produced a substantial number of non-infringing uses. [136] However, intention seems like a bad approach. For one thing, it brings the DMCA too close to tort law and tort law seems inappropriate in the context of copyright law, where the principles are based on utilitarian incentive concerns rather than wrongdoings per se. As a result, it may make more sense to focus on the outcome, such as a substantial non-infringing use, or risk-management through reasonable foreseeability. Moreover, figuring out the intention is more difficult than determining the outcome, since intention is subjective. Finally, in the world of circumvention, much hacking is done primarily for pleasure and not with the intention of infringing. Jon Johansen, for example, broke the CSS electronic lock in DVDs for the challenge of it, not for profit. [137] E. Vicarious Infringement Yet a different possible ‘reasonable relationship’ adopts the standard used in vicarious infringement. This would require the plaintiff to prove that the defendant received financial benefit from the infringement and had the right and ability to control the direct infringer's acts. [138] Using the vicarious infringement standard, defendants would not be found liable. Jung and the other defendants did not benefit from illegal players use -- or anyone's use, for that matter. Arguably, however, the defendants do receive a financial benefit, using the court's reasoning in A&M Records, Inc. v. Napster Inc. [139] The court defined financial benefit broadly, noting that the “future revenue” of Napster would increase as more users were drawn to the database. [140] In Davidson, also, if the defendants decided to sell advertising on bnetd.org in the future, the number of people drawn to bnetd.org by infringing activity would increase its “userbase.” [141] Even so, Jung did not have the ability to stop illegal users from using bnetd.org because he did not have access to the list of valid CD keys. The benefit of using the vicarious infringement standard is that Blizzard would be motivated to make interoperability possible without infringement, because otherwise circumventers like Jung would not be liable. If Blizzard made it possible for Jung to check CD keys and Jung did not take advantage of that, Jung would be liable for ‘willful blindness.’ [142] Thus, vicarious infringement promotes interoperability and producing more products for the public. On the other hand, this is a very high bar for plaintiffs to prove: much higher than reasonable foreseeability and probably higher than commercially non-infringing use. The standard would have no effect in cases where a circumventer made a circumventing technology available to the public and then washed their hands of it. This would, for example, let malicious hackers off the hook. It would also not stop hackers who did it just for the fun of it, causing huge losses to the copyright owner. Finally, this tool is already available to plaintiffs under a vicarious infringement claim. F. Judge Posner's Balancing Approach A final possibility is to take Judge Posner's approach in In re Aimster. [143] He argued that the court should make a cost-benefit analysis in each case: the defendant would be liable only if the cost of preventing infringement was less than the amount of copyright damage which would ensue if infringement continued unchecked. [144] Using this approach, the defendants in Davidson should be liable for infringement related to the illegal copies of Battle.net material. It would have been a very simple matter for the defendants to create bnetd.org without using copyrighted images from Battle.net in bnetd.org. The Battle.net material was not necessary to make bnetd.org work and probably contributed only marginally to making bnetd.org a better product. [145] As a result, the cost of preventing infringement by not including Battle.net material on bnetd.org was next to nothing. However, leaving that material on bnetd.org caused the infringement described above: illegal copies on the personal computers of users and illegal distribution, public display, and public performance by the defendants. The cost-benefit analysis is less clear in the infringement resulting from illegally copied CDs. With regard to the ```
""
{"document_type": "Books", "task": "document_parsing"}
9ddbcee522b4d2c48919b07690c5efc5
```markdown 12. Cikrikcioglu MA, Hursitoglu M, Erkal H, et al. Oxidative stress and autonomic nervous system functions in restless legs syndrome. *Eur J Clin Invest*. 2011;41(7):734–742. 13. Hull EM, Muschamp JW, Sato S. Dopamine and serotonin: influences on male sexual behavior. *Physiol Behav*. 2004;83(2):291–307. 14. Walters AS, Rye DB. Review of the relationship of restless legs syndrome and periodic limb movements in sleep to hypertension, heart disease, and stroke. *Sleep*. 2009;32(5):589–597. 15. de Groat WC, Booth AM. Neural control of penile erection. In: Maggi CA, ed. *Nervous Control of the Urogenital System*. (The Autonomic Nervous System, vol 3). London, United Kingdom: Harwood Academic Publishers; 1993:465–513. 16. Phillips B, Young T, Finn L, et al. Epidemiology of restless legs symptoms in adults. *Arch Intern Med*. 2000;160(14):2137–2141. 17. Allen RP, Picchietti D, Hening WA, et al. Restless legs syndrome: diagnostic criteria, special considerations, and epidemiology. A report from the restless legs syndrome diagnosis and epidemiology workshop at the National Institutes of Health. *Sleep Med*. 2003;4(2):101–119. 18. National Institutes of Health. Impotence. *NIH Consens Statement*. 1992;10(4):1–33. 19. Lewis RW, Fugl-Meyer KS, Bosch R, et al. Definitions, classification, and epidemiology of sexual dysfunction. In: Lue TF, Basson R, Rosen RC, et al, eds. *Sexual Medicine*. Paris, France: Health Publications; 2004:37–72. 20. Jenkins CD, Stanton BA, Niemcryk SJ, et al. A scale for the estimation of sleep problems in clinical research. *J Clin Epidemiol*. 1988;41(4):313–321. 21. Platz EA, Kawachi I, Rimm EB, et al. Physical activity and benign prostatic hyperplasia. *Arch Intern Med*. 1998;158(21):2349–2356. 22. Kawachi I, Colditz GA, Ascherio A, et al. Prospective study of phobic anxiety and risk of coronary heart disease in men. *Circulation*. 1994;89(5):1992–1997. 23. Barry MJ, Fowler FJ Jr, O’Leary MP, et al. The American Urological Association symptom index for benign prostatic hyperplasia. The Measurement Committee of the American Urological Association. *J Urol*. 1992;148(5):1549–1557. 24. Wolf AM, Hunter DJ, Colditz GA, et al. Reproducibility and validity of a self-administered physical activity questionnaire. *Int J Epidemiol*. 1994;23(5):991–999. 25. Greenland S. Model-based estimation of relative risks and other epidemiologic measures in studies of common outcomes and in case-control studies. *Am J Epidemiol*. 2004;160(4):301–305. 26. Zou G. A modified Poisson regression approach to prospective studies with binary data. *Am J Epidemiol*. 2004;159(7):702–706. 27. Sikandar R, Khealani BA, Wasay M. Predictors of restless legs syndrome in pregnancy: a hospital based cross sectional survey from Pakistan. *Sleep Med*. 2009;10(6):676–678. 28. O’Keeffe ST, Gavin K, Lavan JN. Iron status and restless legs syndrome in the elderly. *Age Ageing*. 1994;23(3):200–203. 29. Hening WA, Allen RP, Washburn M, et al. The four diagnostic criteria for restless legs syndrome are unable to exclude confounding conditions (“mimics”). *Sleep Med*. 2009;10(9):976–981. 30. Allen RP, Walters AS, Montplaisir J, et al. Restless legs syndrome prevalence and impact: REST general population study. *Arch Intern Med*. 2005;165(11):1286–1292. 31. Zias N, Bezwada V, Gilman S, et al. Obstructive sleep apnea and erectile dysfunction: still a neglected risk factor? *Sleep Breath*. 2009;13(1):3–10. 32. Karacan I, Karatas M. Erectile dysfunction in sleep apnea and response to CPAP. *J Sex Marital Ther*. 1995;21(4):239–247. 33. Margel D, Tal R, Livne PM, et al. Predictors of erectile function improvement in obstructive sleep apnea patients with long-term CPAP treatment. *Int J Impot Res*. 2005;17(2):186–190. 34. Taskin U, Yigit O, Acioglu E, et al. Erectile dysfunction in severe sleep apnea patients and response to CPAP. *Int J Impot Res*. 2010;22(2):134–139. 35. Melis MR. Central control of penile erection: role of the paraventricular nucleus of the hypothalamus. *Prog Neurobiol*. 2005;76(1):1–21. 36. Paulus W, Dowling P, Rijsman R, et al. Pathophysiological concepts of restless legs syndrome. *Mov Disord*. 2007;22(10):1451–1456. 37. Mann K, Pankok J, Connemann B, et al. Sleep investigations in erectile dysfunction. *J Psychiatr Res*. 2005;39(1):93–99. 38. Salin-Pascual R, Gerashchenko D, Greco MA, et al. Hypothalamic regulation of sleep. *Neuropsychopharmacology*. 2001;25(5 suppl):S21–S27. 39. Yeh P, Walters AS, Tsuang JW. Restless legs syndrome: a comprehensive overview on its epidemiology, risk factors, and treatment. *Sleep Breath*. 2012;16(4):987–1007. 40. Clemens S, Rye D, Hochman S. Restless legs syndrome: revisiting the dopamine hypothesis from the spinal cord perspective. *Neurology*. 2006;67(1):125–130. 41. Rees PM, Fowler CJ, Maas CP. Sexual function in men and women with neurological disorders. *Lancet*. 2007;369(9560):512–525. 42. Hirshkowitz M, Karacan I, Arcasoy MO, et al. The prevalence of periodic limb movements during sleep in men with erectile dysfunction. *Biol Psychiatry*. 1989;26(6):541–544. 43. Picchietti D, Winkelman JW. Restless legs syndrome, periodic limb movements in sleep, and depression. *Sleep*. 2005;28(7):891–898. 44. Nomura T, Inoue Y, Kusumi M, et al. Prevalence of restless legs syndrome in a rural community in Japan. *Mov Disord*. 2008;23(16):2363–2369. 45. Celle S, Roche F, Kerleroux J, et al. Prevalence and clinical correlates of restless legs syndrome in an elderly French population: the Synapse Study. *J Gerontol A Biol Sci Med Sci*. 2010;65(2):167–173. 46. Gao X, Schwarzschild MA, Wang H, et al. Obesity and restless legs syndrome in men and women. *Neurology*. 2009;72(14):1255–1261. 47. O’Donnell AB, Araujo AB, Goldstein I, et al. The validity of a single-question self-report of erectile dysfunction. Results from the Massachusetts Male Aging Study. *J Gen Intern Med*. 2005;20(6):515–519. 48. Bliwise DL, Nekich JC, Dement WC. Relative validity of self-reported snoring as a symptom of sleep apnea in a sleep clinic population. *Chest*. 1991;99(3):600–608. 49. Ketterer MW, Brymer J, Rhoads K, et al. Snoring and the severity of coronary artery disease in men. *Psychosom Med*. 1994;56(3):232–236. (Appendix follows) ```
""
{"document_type": "Books", "task": "document_parsing"}
60f9a87e599eacc41ac8fc3d14834295
```markdown their entrance into adulthood and until late in middle age. Partly for this reason, members of this cohort tend to have high disposable incomes and net worth in old age. Furthermore, people in the cohort who receive low or no income-related pensions are entitled to a public basic economic security scheme that is relatively generous by historical and international comparisons (Esser & Palme 2010). It seems that representatives from Social services and the Enforcement Authority pay too much attention to these historical circumstances when they meet people from this cohort. This situation can be described as a “shadow problematic” and might exacerbate social exclusion among young pensioners who live with economic hardship. Instead, it needs to be acknowledged that some people in this cohort need extra economic and social support because they face economic hardship in combination with, for example, illness, disability, maintenance costs for children, alcohol misuse, social isolation, restricted mobility, or psychological illness. Furthermore, according to Gilleard and Higgs (2011), a new generation of elderly people began entering into old age in Western industrialized countries at the end of the 20th century. This new generation is said to be gradually altering the norm for old age. Every new cohort of young pensioners visits restaurants, coffee shops, theatres, and cinemas more than the previous cohort. Each is also using more and more time for exercise and travelling. Their social networks are becoming more widespread, and friends are becoming more important within those networks. Gilleard and Higgs (2011) argue that the same kind of development were observed among teenagers in Western industrialized countries during the late 1950s and 1960s—in the decades after the end of the Second World War. The same kind of lifestyle as emerged among teenagers during the late 1950s and 1960s is now becoming more and more common at the beginning of old age, as new cohorts of elderly people enter into this life phase. This is explained by the fact that many young pensioners have the health and the economic resources to live in this way. Another contributing factor is that every new cohort of elderly people has adopted the values behind this lifestyle to a greater extent than the last. In Sweden people born in the 1940s and between 1945 and 1955 are seen as the ones who will change the meaning of old age in the direction just described (Brembeck 2009, 2010; Lindgren et al. 2005; Majanen et al. 2007). These cohorts are thus seen as a new generation of elderly people, indicating a clear break between this generation and the previous one in the country. However, the results of this dissertation support Gilleard and Higgs’s (2011) theory about a more gradually changing normality in old age. The interviewees strived for the same kind of general goals in everyday life regardless of birth year, life history, and current economic and health situation. Furthermore, the ways that the interviewees tried to meet these goals align with the lifestyle that Gilleard and Higgs (2011) describe as the new emerging “normal” among ```
""
{"document_type": "Books", "task": "document_parsing"}
cd285dd312cd2df656b3983dd984bb15
```markdown Bear Sterns, formerly the fifth largest U.S. investment bank agreed to a purchase deal by JPMorgan Chase with US$2 per share which was then revised to US$10 per share. On 11 July 2008, IndyMac Bancorp, Inc., another major U.S. mortgage lender was seized by the Federal regulator after a bank run. Lehman Brothers, previously the U.S. fourth largest investment bank declared bankruptcy on 15 September 2008. On the same day, Merrill Lynch, the world largest brokerage agreed to a US$50 billion purchase deal by Bank of America. Just after a few days, on 21 September 2008, two other US largest investment banks, Goldman Sachs Group and Morgan Stanley became bank holding companies under the regulation by the Federal Reserve Board. According to Mehl (2013), the demise of Lehman Brothers had pushed risk aversion and global uncertainty to the historic level. In fact, the U.S. subprime crisis had triggered the 2007-2009 financial crisis that spread over to the European Union’s (hereafter, EU) economies and United Kingdom. Much of the U.S. securitized-debt was originated to be distributed to European institutions and investors which caused them to suffer substantial losses for investing in the U.S. subprime mortgage securities, for instance, a large German bank, IKB undergone a massive bailout by the German government (see Eubanks, 2010). Further, in United Kingdom, banks were highly depending on short-term funding for financing the holding of long-term mortgages. The weakened securitized products market forced them to depend upon the funding provided by wholesale money market. Problem arose when these banks could not attract fund from the money market. Northern Rock, for example, was forced to seek for assistance form the Bank of England. This provoke a run by depositors and resulted in nationalization (Dimsdale, 2009). No doubt, banking crisis is a threat to the resilience of banking sector. It can cause severe disruption in the domestic banking system. In addition, it may be magnified by the contagion effect because financial institutions are interconnected through the financial system. Thus, policy makers and regulators of the banking system require an effective early warning system (hereafter, EWS) to detect the emergence of banking crisis. Generally, EWS is applied to various types of financial crises such as banking crisis, currency crisis, speculative bubbles and crashes, and sovereign default. By definition, Boiton (2012) refers EWS as the mechanism that transforms the information contained in economic and financial indicators into a measure of future vulnerability. Lestano et al. (2003) explain that EWS is a monitoring tool used to predict financial crisis which all existing EWS models apply fundamental determinants of both the domestic and external sectors as explanatory variables. The importance of EWS is irrefutable. Bussiere and Fratzscher (2002) have mentioned that EWS models are developed to identify economic weaknesses as well as vulnerabilities of emerging markets and ultimately to anticipate such events. An effective EWS will provide accurate crisis signals for the use of policy makers as well as regulators of the banking system, in which the information contained in the crisis signals is crucial for setting pre-emptive measures prior to the arrival of financial crisis. Moreover, EWS has great value due to the awareness that financial crisis will incur large costs (Lestano et al., 2003), while having a potential for contagion (Özlale and Metin-Özcan, 2007; Boitan, 2012). Developing an effective EWS is a difficult task. According to Bussiere and Fratzscher (2002), it is challenging to reliably predict the occurrence of a crisis in a particular country. In addition, it is highly ambitious to predict the accurate timing of a crisis. Berg and Pattillo (1999) point out that the predictive power of even the best crisis forecasting models may be limited. As Bussiere and Fratzscher (2002) note, EWS models are subject to post-crisis bias, thus it is not easy to select the optimal threshold or cut-off level in a logit model. Furthermore, Edison (2003) highlights that predictive models ```
""
{"document_type": "Books", "task": "document_parsing"}
f435eba1763f28d747be1b67d6b3f8ae
```markdown basic experience in Tianjin's work, and also the most encouraging major progress. Over the past few years, we have strived to closely connect the line, principles and policies of the party Central Committee with the reality of Tianjin, and after mastering the guidelines of the party Central Committee, have proceeded from reality in implementing them in a creative manner. We attached importance to studying and applying the basic theory of Marxism, but we always regarded Marxism as a science to be continuously developed during practice, refrained from sticking to some outdated ideas and theses, and had the courage to eliminate the dogmatic understanding of Marxism and the erroneous ideas adopted in the name of Marxism so that Marxism can correctly reflect and guide practice. We attached importance to learning from the experiences of other countries and other people, but instead of copying them mechanically, we decided what we should adopt them based on our actual conditions. We attached importance to the opinions of the majority, but we made judgements through social practice, and respected and protected the correct opinions of the minority instead of easily negating the opinions of the minority. In short, we stressed adherence to the practice-understand-repractice-reunderstand dialectical materialist theory of knowledge in handling the major issues on construction and reform, and fairly successfully guarded against ossified ideas and self-confinement, thus enabling our thinking to catch up with the development of practice. Meanwhile, we provided the masses of people and cadres at various levels with the possibility to explore in the process of practice, and the chances of choice so that all the undertakings of the municipality are vigorous and filled with creative vitality. Second, we persistently put reform in the center of all our undertakings, and facilitated reform in an active and prudent manner. All our achievements were scored through resolute efforts to facilitate reform, and all the problems in reform we had encountered were solved continuously through the efforts to deepen reform. Putting reform in the center of all our undertakings has become a principle adhered to by more and more comrades. A solid mass foundation is needed to persistently carry out reform. We always regarded reform as a process of the masses' creation of history, respected the status of the masses as masters, treated the sensitive issues concerning the interests of the masses in a prudent manner, and adopted vivid and lively measures to make the masses understand the policies and progress of reform, enhance their scientific understanding of the nature of reform, understand the arduousness and complexity of reform, and then voluntarily plunge into the great practice of reform. To carry out reform persistently, we should correctly master the relationship between reform and construction. We implemented the guiding principle of relying on reform in carrying out construction and promoting construction with reform and, through exploration, we gained a successful experience of closely combining reform with the campaign to increase production and practice economy, and achieving success in them simultaneously. In this way, reform measures were instilled into the specific economic targets for which millions of laborers were working every day and every hour, and the campaign to increase production and practice economy provided a good economic environment for reform. These two situations conditioned and promoted each other. To carry out reform persistently, we should firmly grasp the two basic points of the line adopted at the 3d Plenary Session of the 11th CPC Central Committee. We paid attention to educating cadres to unswervingly uphold both the four cardinal principles and reform and opening up and to integrate them in the practice of building socialism with Chinese characteristics. When the ideological trend of bourgeois liberalization ran rampant, we waged resolute and effective struggles with a clear-cut stand; and when reform and opening up encountered obstacles, we strengthened the work of publicizing the reform and rallying public support for it and firmly pushed forward the reform and opening up. It was by adhering to these important guiding principles and measures that we fundamentally guaranteed the important position of reform in all our undertakings. Third, we adhered to the principle of stable development and correctly mastered and controlled the situation. In the past several decades, we encountered problems and took detours in our construction and work and often demanded rash development. Learning from historical experiences and in view of the actual situation, we always regarded stable development as an important guiding principle; stressed the importance of acting according to the objective law and proceeding from the national and municipal situation; persistently made small but unremitting steps to avoid detours; and put forward the principle of stability, steadiness, and prudence. Stability means that we paid attention to bringing the relations of various sectors into better balance, in particular the people's feelings, and strived to created a harmonious and coordinated social environment. Steadiness means that we stressed both the need to make active progress in high spirit and the need to avoid rash and ill-considered advance, that we worked cautiously, and that we advanced in a steady manner. Prudence means that we always prepared fully for any work, particularly for the implementation of major reform measures and policies, and seized opportunities to proceed in an orderly way in order to avoid mistakes and reduce reverberation as much as possible. Practice proved that this principle had a positive and profound influence on consolidating and developing Tianjin's excellent situation. It enabled cadres at various levels to pay attention to keeping a cool head, judge the hour, and size up the situation under either smooth or difficult conditions, and rapidly and correctly resolve various complicated contradictions so that the ratio among various sectors could become more balanced, the various undertakings could develop in a coordinated manner, ```
""
{"document_type": "Books", "task": "document_parsing"}
91215df16582e66081cb501eb9e6d163
```markdown 3. NAAQS Control Strategies. In addressing control strategies, we believe that the appropriate time to include data from the new methods is during the development of the SIPs to address the revised 8-hr ozone and PM 2.5 standards. As part of the revision process, there will be significant review and new analysis of emission sources and reassessment of application of RACT. We would recommend this as a convenient opportunity to add information from the new methods into program development. We would not recommend using the information from the new methods to revise the analysis of the previous 1-hr ozone SIPs. We recognize that in some cases an existing RACT limit has been based on an identified technology and, the data used to characterize the performance of that technology and to establish the limits understated the total mass of VOC emissions. In such cases, EPA or a state cannot simply apply a new VOC test methodology to determine compliance with the old limit because that could have the effect of making the limit more stringent and possibly forcing the installation of different control technology than that already established as RACT. 4. State-based Programs. Many states have developed complementary programs to enhance the effectiveness of air pollution control efforts in their states, such as cap and trade systems and emissions banking. Where these programs are based on state rules, we would adopt as a general principle that the individual state should determine the appropriate time for incorporating the information from the new methods or if these rules are incorporated into an approved SIP, that the state should handle them as described in Item 3. As the states make changes that affect these programs, they must maintain the integrity of the system that they use for accounting and tracking emission credits. Comparing prior emission reductions that were calculated on an as-carbon basis with planned emission increases expressed as total mass of VOC would be comparing "apples to oranges" and would generally result in requiring greater emissions reductions than are needed to offset the planned emissions. If the information from the new methods leads to a change in reported facility mass emissions, the state must develop a procedure for adjusting previous valuations so that there is a reasonable equivalence between emissions determined by using different methods. This will ensure that past emission reductions are not undervalued when compared to future emission increases and similarly, that future emission reductions are not overstated. Although we have not yet fully evaluated all of the calculations involved, we believe that a system can be developed that will establish equivalence for offsets and reductions that meet the federal minimum requirements. We do not believe it is necessary, however, to revisit emission reduction credits that have already been used to offset emissions increases. 5. Establishing Facility Emission Limits and Measuring Compliance. Many emission limitations and periodic monitoring and reporting requirements are determined by state regulations or specified in state permits. We will defer to the individual state's judgment whether and at what time it is appropriate to revise their emission limits or operating permits to incorporate information from the new methods. For sources who ```
""
{"document_type": "Books", "task": "document_parsing"}
0b3a2172b8c3eed2344c06e062e14b75
```markdown preferentially admit WICHE PSEP applicants. However, in 2017, the WICHE Commission capped the maximum incentive for each PSEP public program at 20 percent of the respective field’s support fee. This policy became effective for new students enrolling in Fall 2019 and forward. Continuing students (those who enrolled in their respective PSEP program prior to academic year 2019) continue to pay resident tuition to public programs receiving an incentive, and programs are allowed to retain the full incentive for continuing students until they graduate. Additionally, for new students enrolling in summer/fall 2019 and later, any incentive amounts in excess of the 20 percent cap must be credited to the student’s account, further reducing his/her resident tuition. If your program is affected by the 20 percent cap on support fee incentives for AY2020-21, WICHE staff will contact you with an illustration. Programs not affected by the 20 percent cap on support fee incentives are listed below. If your program falls into one of these categories, credit the support fee to the student’s nonresident or full private tuition, and charge the PSEP student the balance: 1. Public programs whose resident/nonresident tuition differential is greater than the support fee; 2. “Self-pay” public programs that charge residents and nonresidents the same tuition rate; 3. Private programs. 15. **PSEP is a tuition reduction and student access program.** Payments are made directly to the institution to reduce the student’s tuition. Payments are not made to the student. Though often termed a “scholarship,” WICHE and its sending states/territories do not consider PSEP support as a scholarship but rather a tuition reduction program that promotes affordable access to studies in the health care professions. Some WICHE states/territories require graduates to complete a service payback. If the graduate does not return to the home state/territory to serve, the support fees become a loan which must be reimbursed. Repayment terms (interest rate, repayment period and other details) vary by state/territory. 16. **Bilateral contracts.** For historic, geographic proximity and other reasons, some states have contracts with specific institutions outside the region (in fields including dentistry and optometry). At the discretion of all parties, these contracts can be administered by the WICHE office under the same rules and timelines used by regular PSEP programs. To maintain a robust Professional Student Exchange Program, WICHE leadership encourages WICHE states/territories to use the existing in-region programs whenever possible and discourages the development of future bilateral contracts outside of the WICHE region. If a state/territory perceives that an insufficient number of positions are available in a particular health care profession for its residents, WICHE encourages the state/territory to explore creative in-region options with ```
""
{"document_type": "Books", "task": "document_parsing"}
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
10